News
17 February 2018
CYBERSECURITY RISKS FOR MANUFACTURING
Industrial and manufacturing companies do not consider themselves a lucrative target for cyber criminals and thus, not surprisingly, have taken fairly minor measures to secure their systems …...
11 February 2018
WHAT IS CRYPTOJACKING? HOW TO PREVENT, DETECT, AND RECOVER FROM IT
SecBI’s CTO quoted, “Cryptojacking is easy to detect via network monitoring solutions…However, few organizations with network motoring tools and data have the tools and capabilities to analyze that information for accurate detection. SecBI, for example, develops an artificial intelligence solution …...
04 February 2018
PC RUNNING SLOWLY? YOU MAY BE A NODE IN A VAST CRYPTOMINING NETWORK
“It’s extremely hard to detect,” said Alex Vaystikh, chief technology officer at SecBI Ltd., which makes a security intelligence platform. “It’s basically a denial-of-service attack against your CPU.” Cryptomining software works on any browser and can hijack any processor. That …...
05 January 2018
INDUSTRY INNOVATORS 2017 – CYBER THREAT ANALYSIS AND INTELLIGENCE
SecBI is one of the most creative approaches to breach analysis that we’ve seen and certainly deserves its spot in this year’s class of innovators …...
03 January 2018
TOP SECURITY CHALLENGES FOR 2018 – PART 1
Gilad Peleg, CEO, SecBI, ” Bitcoin will become so profitable in 2018 that it will have devastating impacts for years to come , including corporate machines exploited to mine bitcoin, costing enterprises money in employee productivity, hardware half-life, and electricity …...
21 December 2017
WILL THE SUPPLY OF SKILLED INFORMATION SECURITY ANALYSTS MATCH THE DEMAND?
Tapping into this huge talent pool [of non-traditional cyber-sec staff] will not be easy, but steps are being taken to make the cyber-security field more appealing to these populations, including teaching girl scouts about cyber-security. Will the supply of skilled …...
19 December 2017
60 CYBERSECURITY PREDICTIONS FOR 2018
In 2017, there were several large-scale breaches that covered three key areas: sensitive healthcare information, government clearance information, and financial and credit data. In 2018, that data could become available on the dark Internet in aggregate, giving any individual or …...
19 December 2017
HOW DO NEW CYBERSECURITY RISKS SHAPE APPROACHES TO RISK ASSESSMENTS?
Some organizations feel that relying on last year’s approaches to cybersecurity risk assessment would provide insufficient preparation for this year’s advanced cyberattacks. I respectfully disagree. Cyber risk assessment is something that many organizations still do not do at all: doing …...
19 December 2017
3 WAYS TO PROTECT YOUR HOSPITAL FROM A CYBERSECURITY DISASTER
In the last few years, a large number of hospitals have been caught off guard by crippling cyberattacks. Because hackers are becoming increasingly sophisticated in their methods and healthcare administrators are struggling to keep up with emerging threats, hospitals are …...
19 December 2017
2018 SECURITY PREDICTIONS: IT’S STILL THE WILD, WILD WEST
The last US presidential election revealed the dangers and the difficulties of prognostication. But that doesn’t deter those determined to look ahead at what we may face in 2018. We reached out to several security mavens to learn what worries …...