Play Demo

Automated Detection & Response Blog

cybersecurity trends
Top Cyber Trend Predictions for Enterprises to Look for in 2...
  By Gilad Peleg, CEO of SecBI 1. In SaaS nobody knows you were hacked leading enterprises to seek better visibility ...
Le SIEM : ce mirage de la Sécurité informatique...
  By Cyrille Herdhuin, Cyber Security professional at SCOR For the English version of the blog, click here.   Pour ceux qui ne le sauraient ...
facebook hack
Lessons learned from the Facebook breach: The Chain Reaction...
  By Alex Vaystikh, Co-founder, SecBI Facebook recently suffered one of its major breaches in its history. Needless to say, if a Facebook cyberattack b...
threat detection
Living on the Defensive...
  By Arie Fred, VP of Product, SecBI Whether we want to admit it or not, we as cyber defenders are always one step ...
machine learning
Pros and Cons of Unsupervised Vs Supervised Machine Learning...
  By Oren Domaczewski, Product Manager, SecBI Machine learning in cyber threat detection has been hyped as the answer to increasingly ineffective signa...
Gambling with Connections...
By Oren Domaczewski, Researcher, Office of the CTO Recently, a casino was reported to have been hacked, and 10 gigabytes were exfiltrated through its internet-...
surfboard
Keeping up with Hackers using Unsupervised Machine Learning...
By Arie Fred, VP of Product, SecBI When you read (or hear) statements like when “the longer detection systems are in place, the more effective they become” oft...
cybersecurity
Meet the Team: Ligal Levy...
  By Sarah Mehlman, Marketing Manager, SecBI Get to know, a member of SecBI’s R&D team, Ligal Levy. Ligal, a former member of an Israeli army’s int...
Miner shack 300x204
What to Expect in the World of Crypto-jacking by Alex Vaysti...
The smart TV you bought recently is taking a long time to respond. The wireless IP camera you use to monitor your safe drains its battery in minutes. The monitori...
© 2020 SecBI Terms of Use Privacy