Play Demo

Blog

Uncategorized

Jeopardy
The “JEOPARDY” of Cyber Security...
By Ravid Circus, Director of Presales, SecBI One of my fondest childhood memories is sitting in the living room with my parents and siblings glued to the telev...
Remote Access Trojan
The Remote Access Trojan (RAT), a Legacy Product at a Mass M...
By Arie Fred, VP of Product, SecBI The Remote Access Trojan (RAT) can almost be considered the “legacy” tool of hackers.  The RAT is a malware program that use...
data breach 750x423
Data breaches are a reality of doing business in the digital...
Three major data breaches were exposed recently. In the first, credit rating agency Equifax was hacked, and details of more than half of the US population lea...
Detection and Response is Top Security Priority for Organiza...
Research firm Gartner today released a report titled “Market Insight: Security Market Transformation Disrupted by the Emergence of Smart, Pervasive and Efficient ...
cybersecurity
If nobody looks at the alerts in the SIEM, are they really a...
It’s amazing how often I come across this statement from organizations. The motivation is good – better detection. Sometimes it involves implementing the late...
© 2020 SecBI Terms of Use Privacy