Play Demo

Blog

Machine Learning

cybersecurity
Is Admitting You’re One Step Behind Attackers the Key ...
  By Arie Fred, VP of Product, SecBI While cyber defenders work to protect their networks, hackers and more sophisticated nation-state attackers focus ...
machine learning
Supervised and Unsupervised Machine Learning: The Yin Yang o...
  By Daniel Felman, Lead Data Scientist, SecBI In Chinese philosophy, the Yin and Yang represent how seemingly adverse poles might actually complement ...
machine learning
Pros and Cons of Unsupervised Vs Supervised Machine Learning...
  By Oren Domaczewski, Product Manager, SecBI Machine learning in cyber threat detection has been hyped as the answer to increasingly ineffective signa...
surfboard
Keeping up with Hackers using Unsupervised Machine Learning...
By Arie Fred, VP of Product, SecBI When you read (or hear) statements like when “the longer detection systems are in place, the more effective they become” oft...
cybersecurity
Meet the Team: Ligal Levy...
  By Sarah Mehlman, Marketing Manager, SecBI Get to know, a member of SecBI’s R&D team, Ligal Levy. Ligal, a former member of an Israeli army’s int...
network traffic
Patrolling network traffic with SecBI...
SecBI’s new software aims to eliminate two of the problems with using traffic analysis in cybersecurity: volume processing of data for actionable threat intellige...
machine learning
Using Cluster Analysis for Comprehensive Threat Detection...
Cyber-attacks are becoming stealthier and with the ability to remain dormant for long periods of time. Some of the ways malware stays hidden include changing thei...
AI
AI and you: Artificial Intelligence in Cybersecurity...
Artificial intelligence is the buzzword in the security world today. It is expected to totally revolutionize cybersecurity and incident response, and even solve t...
alerts, SIEM
Are You Still Chasing Alerts Instead of Chasing Your Adversa...
Today’s hackers have easy access to sophisticated tools that enable them to launch extremely stealthy attacks at very low cost. These attacks can bypass tradition...
cybersecurity
Re: Rise of non-deterministic Security!...
Anton Chuvakin wrote a great blog about the future of machine-learning in cyber-security. My response was a bit too long for a comment, so I decided to post it as...
© 2020 SecBI Terms of Use Privacy