Play Demo

Automated Detection & Response Blog

cybersecurity breach
Data breach notification- your time is running out
Throughout the globe, regulatory bodies are tightening their grip over companies and organizations that handle personal information, enforcing more stringent data...
Don’t cry- Luckily it was just Ransomware
As I write this sentence, the humongous, nightmarish cyber attack that took place during the weekend of May 12th has gained the perpetrators only $26,000, accordi...
AI and you: Artificial Intelligence in Cybersecurity
Artificial intelligence is the buzzword in the security world today. It is expected to totally revolutionize cybersecurity and incident response, and even solve t...
alerts, SIEM
Are You Still Chasing Alerts Instead of Chasing Your Adversaries?
Today’s hackers have easy access to sophisticated tools that enable them to launch extremely stealthy attacks at very low cost. These attacks can bypass tradition...
European and US businesses in the crosshairs of nation state cyber espionage
Corporations used to think that their main threat was from cyber criminals, but recent events have changed this notion. According to a new report by Trend Micro, ...
Detection and Response is Top Security Priority for Organizations in 2017
Detection and Response is Top Security Priority for Organizations in 2017
Research firm Gartner today released a report titled “Market Insight: Security Market Transformation Disrupted by the Emergence of Smart, Pervasive and Efficient ...
2017 Cyber Security Predictions
As we greet another new year, we must remain vigilant in our fight against hackers and cyber criminals. Today’s sophisticated threats can have devastating eff...
If nobody looks at the alerts in the SIEM, are they really alerts?
It’s amazing how often I come across this statement from organizations. The motivation is good – better detection. Sometimes it involves implementing the late...
Re: Rise of non-deterministic Security!
Anton Chuvakin wrote a great blog about the future of machine-learning in cyber-security. My response was a bit too long for a comment, so I decided to post it as...
© 2022 SecBI Terms of Use Privacy