Play Demo

Blog

Threat Detection

cybersecurity
To Publicize Your Cyber Deployment, Or Not To Publicize… Tha...
By Susan Becker, VP of Marketing, SecBI It is probably obvious from my marketing perspective what I am going to say. Still, the recent events with one of our p...
facebook hack
Lessons learned from the Facebook breach: The Chain Reaction...
  By Alex Vaystikh, Co-founder, SecBI Facebook recently suffered one of its major breaches in its history. Needless to say, if a Facebook cyberattack b...
threat detection
Living on the Defensive...
  By Arie Fred, VP of Product, SecBI Whether we want to admit it or not, we as cyber defenders are always one step ...
machine learning
Pros and Cons of Unsupervised Vs Supervised Machine Learning...
  By Oren Domaczewski, Product Manager, SecBI Machine learning in cyber threat detection has been hyped as the answer to increasingly ineffective signa...
cybersecurity
Meet the Team: Ligal Levy...
  By Sarah Mehlman, Marketing Manager, SecBI Get to know, a member of SecBI’s R&D team, Ligal Levy. Ligal, a former member of an Israeli army’s int...
network traffic
Patrolling network traffic with SecBI...
SecBI’s new software aims to eliminate two of the problems with using traffic analysis in cybersecurity: volume processing of data for actionable threat intellige...
machine learning
Using Cluster Analysis for Comprehensive Threat Detection...
Cyber-attacks are becoming stealthier and with the ability to remain dormant for long periods of time. Some of the ways malware stays hidden include changing thei...
alerts, SIEM
Are You Still Chasing Alerts Instead of Chasing Your Adversa...
Today’s hackers have easy access to sophisticated tools that enable them to launch extremely stealthy attacks at very low cost. These attacks can bypass tradition...
© 2020 SecBI Terms of Use Privacy