Automated Detection & Response Blog

Top Cyber Trend Predictions for Enterprises to Look for in 2019
By Gilad Peleg, CEO of SecBI
1. In SaaS nobody knows you were hacked leading enterprises to seek better visibility ...

Le SIEM : ce mirage de la Sécurité informatique
By Cyrille Herdhuin, Cyber Security professional at SCOR
For the English version of the blog, click here.
Pour ceux qui ne le sauraient ...

Lessons learned from the Facebook breach: The Chain Reaction of Cybersecurity Ha...
By Alex Vaystikh, Co-founder, SecBI
Facebook recently suffered one of its major breaches in its history. Needless to say, if a Facebook cyberattack b...

Living on the Defensive
By Arie Fred, VP of Product, SecBI
Whether we want to admit it or not, we as cyber defenders are always one step ...

Pros and Cons of Unsupervised Vs Supervised Machine Learning
By Oren Domaczewski, Product Manager, SecBI
Machine learning in cyber threat detection has been hyped as the answer to increasingly ineffective signa...

Gambling with Connections
By Oren Domaczewski, Researcher, Office of the CTO
Recently, a casino was reported to have been hacked, and 10 gigabytes were exfiltrated through its internet-...

Keeping up with Hackers using Unsupervised Machine Learning
By Arie Fred, VP of Product, SecBI
When you read (or hear) statements like when “the longer detection systems are in place, the more effective they become” oft...

Meet the Team: Ligal Levy
By Sarah Mehlman, Marketing Manager, SecBI
Get to know, a member of SecBI’s R&D team, Ligal Levy. Ligal, a former member of an Israeli army’s int...

What to Expect in the World of Crypto-jacking by Alex Vaystikh, CTO , SecBI
The smart TV you bought recently is taking a long time to respond. The wireless IP camera you use to monitor your safe drains its battery in minutes. The monitori...