Play Demo

Automated Detection & Response Blog

petya
The Demise of Ransomware
  Ransomware is dying, not today, not next month and even not next year.However, it is slowly and surely losing its place as the no. 1 perceived threat to o...
network traffic
Patrolling network traffic with SecBI
SecBI’s new software aims to eliminate two of the problems with using traffic analysis in cybersecurity: volume processing of data for actionable threat intellige...
cybersecurity hunter
3 reasons it’s cool to be a hunter
SANS Institute recently listed “Threat Hunter” as the coolest career in its Cyber Talent Immersion Academy. We couldn’t agree more! However, since there is sti...
data science
What does a data scientist do? An Interview with Dr. Liv Aleen Remez, Data Scien...
Data Science is a major buzz nowadays. In order to learn more, we’ve interviewed Dr. Liv Aleen Remez,  Data Scientist, about her work at SecBI, about data sci...
machine learning
Using Cluster Analysis for Comprehensive Threat Detection
Cyber-attacks are becoming stealthier and with the ability to remain dormant for long periods of time. Some of the ways malware stays hidden include changing thei...
cybersecurity breach
Data breach notification- your time is running out
Throughout the globe, regulatory bodies are tightening their grip over companies and organizations that handle personal information, enforcing more stringent data...
ransomware
Don’t cry- Luckily it was just Ransomware
As I write this sentence, the humongous, nightmarish cyber attack that took place during the weekend of May 12th has gained the perpetrators only $26,000, accordi...
AI
AI and you: Artificial Intelligence in Cybersecurity
Artificial intelligence is the buzzword in the security world today. It is expected to totally revolutionize cybersecurity and incident response, and even solve t...
alerts, SIEM
Are You Still Chasing Alerts Instead of Chasing Your Adversaries?
Today’s hackers have easy access to sophisticated tools that enable them to launch extremely stealthy attacks at very low cost. These attacks can bypass tradition...
© 2020 SecBI Terms of Use Privacy