Play Demo

Automated Detection & Response Blog

Le SIEM : ce mirage de la Sécurité informatique
  By Cyrille Herdhuin, Cyber Security professional at SCOR For the English version of the blog, click here.   Pour ceux qui ne le sauraient ...
facebook hack
Lessons learned from the Facebook breach: The Chain Reaction of Cybersecurity Ha...
  By Alex Vaystikh, Co-founder, SecBI Facebook recently suffered one of its major breaches in its history. Needless to say, if a Facebook cyberattack b...
threat detection
Living on the Defensive
  By Arie Fred, VP of Product, SecBI Whether we want to admit it or not, we as cyber defenders are always one step ...
machine learning
Pros and Cons of Unsupervised Vs Supervised Machine Learning
  By Oren Domaczewski, Product Manager, SecBI Machine learning in cyber threat detection has been hyped as the answer to increasingly ineffective signa...
Gambling with Connections
By Oren Domaczewski, Researcher, Office of the CTO Recently, a casino was reported to have been hacked, and 10 gigabytes were exfiltrated through its internet-...
surfboard
Keeping up with Hackers using Unsupervised Machine Learning
By Arie Fred, VP of Product, SecBI When you read (or hear) statements like when “the longer detection systems are in place, the more effective they become” oft...
cybersecurity
Meet the Team: Ligal Levy
  By Sarah Mehlman, Marketing Manager, SecBI Get to know, a member of SecBI’s R&D team, Ligal Levy. Ligal, a former member of an Israeli army’s int...
Miner shack 300x204
What to Expect in the World of Crypto-jacking by Alex Vaystikh, CTO , SecBI
The smart TV you bought recently is taking a long time to respond. The wireless IP camera you use to monitor your safe drains its battery in minutes. The monitori...
crypto1 750x419
Please wait while we use your browser to mine bitcoin
SecBI Autonomous Investigation technology, recently detected a fileless malicious activity affecting one of its customers in the form of a new cyber-attack that r...
© 2021 SecBI Terms of Use Privacy