Blog
Machine Learning

Mrs. MSSP, is your TI Effective?...
By Doron Davidson, Founder & VP Business Development, SecBI
As SecBI’s XDR Platform is gaining interest among MSSPs, we’ve been asked to create some intere...

Is Admitting You’re One Step Behind Attackers the Key ...
By Arie Fred, VP of Product, SecBI
While cyber defenders work to protect their networks, hackers and more sophisticated nation-state attackers focus on develop...

Supervised and Unsupervised Machine Learning: The Yin Yang o...
By Daniel Felman, Lead Data Scientist, SecBI
In Chinese philosophy, the Yin and Yang represent how seemingly adverse poles might actually complement one anothe...

Pros and Cons of Unsupervised Vs Supervised Machine Learning...
By Oren Domaczewski, Product Manager, SecBI
Machine learning in cyber threat detection has been hyped as the answer to increasingly ineffective signa...

Keeping up with Hackers using Unsupervised Machine Learning...
By Arie Fred, VP of Product, SecBI
When you read (or hear) statements like when “the longer detection systems are in place, the more effective they become” oft...

Meet the Team: Ligal Levy...
By Sarah Mehlman, Marketing Manager, SecBI
Get to know, a member of SecBI’s R&D team, Ligal Levy. Ligal, a former member of an Israeli army’s int...

Patrolling network traffic with SecBI...
SecBI’s new software aims to eliminate two of the problems with using traffic analysis in cybersecurity: volume processing of data for actionable threat intellige...

Using Cluster Analysis for Comprehensive Threat Detection...
Cyber-attacks are becoming stealthier and with the ability to remain dormant for long periods of time. Some of the ways malware stays hidden include changing thei...

AI and you: Artificial Intelligence in Cybersecurity...
Artificial intelligence is the buzzword in the security world today. It is expected to totally revolutionize cybersecurity and incident response, and even solve t...

Are You Still Chasing Alerts Instead of Chasing Your Adversa...
Today’s hackers have easy access to sophisticated tools that enable them to launch extremely stealthy attacks at very low cost. These attacks can bypass tradition...