Play Demo

Automated Detection & Response Blog

ransomware
How to Keep Ransomware in the Headlines and Out of Your Network : And that Inclu...
  By Arie Fred, VP of Product, SecBI Cybercrime has hit the news again as a result of the recent Norsk Hydro attack by the ransomware LockerGoga and we...
cybersecurity
To Publicize Your Cyber Deployment, Or Not To Publicize… That Is…
By Susan Becker, VP of Marketing, SecBI It is probably obvious from my marketing perspective what I am going to say. Still, the recent events with one of our p...
machine learning
Supervised and Unsupervised Machine Learning: The Yin Yang of Cybersecurity
By Daniel Felman, Lead Data Scientist, SecBI In Chinese philosophy, the Yin and Yang represent how seemingly adverse poles might actually complement one anothe...
incident response
Incident Response
By Arie Fred, VP of Product, SecBI Security incidents happen, despite the preventive technologies put in place to stop them. Thus, there is a need for an effec...
analytics
Deception vs Analytics, or Can Analytics Catch True Unknown Unknowns?
By Gilad Peleg, CEO of SecBI Gartner analyst, Anton Chuvakin, recently published a debate post, looking into deception tools as a way to detect “unknown unknow...
cybersecurity trends
Top Cyber Trend Predictions for Enterprises to Look for in 2019
  By Gilad Peleg, CEO of SecBI 1. In SaaS nobody knows you were hacked leading enterprises to seek better visibility ...
Le SIEM : ce mirage de la Sécurité informatique
  By Cyrille Herdhuin, Cyber Security professional at SCOR For the English version of the blog, click here.   Pour ceux qui ne le sauraient ...
facebook hack
Lessons learned from the Facebook breach: The Chain Reaction of Cybersecurity Ha...
  By Alex Vaystikh, Co-founder, SecBI Facebook recently suffered one of its major breaches in its history. Needless to say, if a Facebook cyberattack b...
threat detection
Living on the Defensive
  By Arie Fred, VP of Product, SecBI Whether we want to admit it or not, we as cyber defenders are always one step ...
© 2020 SecBI Terms of Use Privacy