Play Demo

Automated Detection & Response Blog

crypto1 750x419
Please wait while we use your browser to mine bitcoin...
SecBI Autonomous Investigation technology, recently detected a fileless malicious activity affecting one of its customers in the form of a new cyber-attack that r...
APT 750x500
Ransomware captures the headlines, but the real threat to or...
It’s nearly the end of 2017, and time for end-of-year reports and conclusions. When it comes to cybersecurity, there’s no doubt that 2017 was the year of ransomwa...
LOGO CCFI1 300x162
SecBI and Orange awarded the France-Israel Chamber of Commer...
SecBI, alongside its partners and investors, Orange, were honored to participate in a Gala Dinner on September 12, hosted by Mr Jean-Yves Le Drian,  Minister of E...
data breach 750x423
Data breaches are a reality of doing business in the digital...
Three major data breaches were exposed recently. In the first, credit rating agency Equifax was hacked, and details of more than half of the US population lea...
petya
The Demise of Ransomware...
  Ransomware is dying, not today, not next month and even not next year.However, it is slowly and surely losing its place as the no. 1 perceived threat to o...
network traffic
Patrolling network traffic with SecBI...
SecBI’s new software aims to eliminate two of the problems with using traffic analysis in cybersecurity: volume processing of data for actionable threat intellige...
cybersecurity hunter
3 reasons it’s cool to be a hunter...
SANS Institute recently listed “Threat Hunter” as the coolest career in its Cyber Talent Immersion Academy. We couldn’t agree more! However, since there is sti...
data science
What does a data scientist do? An Interview with Dr. Liv Ale...
Data Science is a major buzz nowadays. In order to learn more, we’ve interviewed Dr. Liv Aleen Remez,  Data Scientist, about her work at SecBI, about data sci...
machine learning
Using Cluster Analysis for Comprehensive Threat Detection...
Cyber-attacks are becoming stealthier and with the ability to remain dormant for long periods of time. Some of the ways malware stays hidden include changing thei...
© 2020 SecBI Terms of Use Privacy