Play Demo

News

03 February 2019

‘7 Minutes’ with SecBI Co-Founder, VP Doron Davidson

SecBI is taking on DarkTrace, Vectra Networks and other vendors in automated cyberthreat detection and investigation with its two main channel streams. The company delivers automated threat detection and investigation for security operations centers (SOCs) and MSSPs. Doron Davidson, its co-founder, and vice president of business development and customer success...
2019
25 December 2018

2019 Cybersecurity Predictions From SecBI CEO Gilad Peleg

2019 will deliver a slew of more stealthy, advanced cyberattacks with sophisticated methods of penetration and distribution (command-and-control). No doubt automated threat detection and investigation will become a ‘must-have’ for every enterprise and organization in one form or another. Here are the top ten cyber predictions by one of the industry’s experts....
IT Web
21 December 2018

10 cyber security trends to watch in 2019

Biometric hacking, an increase in phishing attacks and sophisticated use of artificial intelligence (AI) are among the top cyber security threats to be expected in 2019, as attackers stop at nothing to steal identities and evade detection through new techniques....
AI Predictions banner 761 254
20 December 2018

2019 Cybersecurity Predictions: Artificial Intelligence

"AI will power cyberattacks more and more.  In fact, it is reasonable to assume that armies of AI hackers will have greater, faster penetration with more automation. Cyberdefense must look to AI for the faster analytics needed to find malicious activities. With machine learning and AI-driven response, security teams can automate triage and prioritization while reducing false positives by up to 91%. Enterprises will seek innovative solutions that enable them to stay ahead of the next unknown threat. They can’t simply look at what they have and just upgrade..." Gilad Peleg, CEO, SecBI....
Artificial Intelligence
11 December 2018

120 AI Predictions For 2019

“AI will power cyberattacks more and more. In fact, it is reasonable to assume that armies of AI hackers will have greater, faster penetration with more automation, allowing hackers to achieve greater success executing cyberattacks. Cyber defense must look to AI for the faster analytics needed to find malicious activities. With machine learning and AI-driven response, security teams can automate triage and prioritization while reducing false positives by up to 91%. Enterprises will seek innovative solutions that enable them to stay ahead of the next unknown threat”—Gilad Peleg, CEO, SecBI...
Dark web mod
09 December 2018

Security Experts Weigh In: The Major Digital Threats of 2019

AI will power cyberattacks more and more. In fact, it is reasonable to assume that armies of AI hackers will have greater, faster penetration with more automation, allowing hackers to achieve greater success executing cyberattacks. Cyber defense must look to AI for the faster analytics needed to find malicious activities....
Hacker with a laptop
21 November 2018

A Guide to the latest hacker’s business model and How to Beat it

Network Traffic Analysis and Monitoring solutions aggregate data from many points inside the network and at the perimeter, and are thereby able to detect cryptomining activity. SecBI’s solution analyzes network data and can reveal cryptojacking activity at the level of the network....
Digital-Cataclyst amsterdam 761x254
08 October 2018

Interview with Alex Vaystikh, Co-founder and CTO at SecBI

In this interview, Alex Vaystikh, Co-founder and CTO at SecBI discusses the issues of manual investigations security teams face often and how technology can help while also improving response times. Alex has 10 years of experience in cyber security research and development, and previously served as Principal Research Scientist at RSA’s Cross-Product Data Science team, which led RSA’s applied Machine Learning and Data Science research. Alex has published several patents and papers, and is a CISSP (Certified Information Systems Security Professional)...
Security Concept
16 September 2018

Identifying the Cyber Kill Chain

When a cyberattack takes place, the defending side detects very few indications, some of which are random. The difficulty is connecting these indications into a single, consistent context. Special interview with the VP of the SecBI Company, established to provide a solution to this specific problem ...
© 2019 SecBI Terms of Use Privacy