Play Demo

Automated Detection & Response Blog

cyberweek
How to Survive CyberWeek: A Complete Guide...
By Sarah Mehlman, Marketing Manager, SecBI As Tel Aviv University’s cyberweek approaches, many cybersecurity experts are pr...
cybersecurity
Is Admitting You’re One Step Behind Attackers the Key ...
By Arie Fred, VP of Product, SecBI While cyber defenders work to protect their networks, hackers and more sophisticated nation-state attackers focus on develop...
SIEM
SIEMs to be Obsolete...
By Daniel Felman, Lead Data Scientist, SecBI In 2005 the concept of Security Information and Event Management (SIEM) combining SIMs and SEMs was first coined. ...
packet capture
When the Results are as Good if not Better, Why Bother with ...
By Gilad Peleg, CEO of SecBI Gartner Analyst, Anton Chuvakin wrote “The escalating sophistication of threats requires organizations to use multiple sources of ...
ransomware
How to Keep Ransomware in the Headlines and Out of Your Netw...
  By Arie Fred, VP of Product, SecBI Cybercrime has hit the news again as a result of the recent Norsk Hydro attack by the ransomware LockerGoga and we...
cybersecurity
To Publicize Your Cyber Deployment, Or Not To Publicize… Tha...
By Susan Becker, VP of Marketing, SecBI It is probably obvious from my marketing perspective what I am going to say. Still, the recent events with one of our p...
machine learning
Supervised and Unsupervised Machine Learning: The Yin Yang o...
By Daniel Felman, Lead Data Scientist, SecBI In Chinese philosophy, the Yin and Yang represent how seemingly adverse poles might actually complement one anothe...
incident response
Incident Response...
By Arie Fred, VP of Product, SecBI Security incidents happen, despite the preventive technologies put in place to stop them. Thus, there is a need for an effec...
analytics
Deception vs Analytics, or Can Analytics Catch True Unknown ...
By Gilad Peleg, CEO of SecBI Gartner analyst, Anton Chuvakin, recently published a debate post, looking into deception tools as a way to detect “unknown unknow...
© 2020 SecBI Terms of Use Privacy