Meet the Team: Ligal Levy

Get to know, a member of SecBI’s R&D team, Ligal Levy. Ligal, a former member of one the Israeli army’s intelligence .

SIEMs to be Obsolete

  In 2005 the concept of Security Information and Event Management (SIEM) combining SIMs and SEMs was first coined. .

When the Results are as Good if not Better, Why Bother with Packet Capture in NTA?

  Gartner Analyst, Anton Chuvakin wrote “The escalating sophistication of threats requires organizations to use .

How to Keep Ransomware in the Headlines and Out of Your Network : And that Includes LockerGoga, NotPetya, WannaCry Among Others

Cybercrime has hit the news again as a result of the recent Norsk Hydro attack by the ransomware LockerGoga and we can .

To Publicize Your Cyber Deployment, Or Not To Publicize… That Is…

  It is probably obvious from my marketing perspective what I am going to say. Still, the recent events with one of our .

Supervised and Unsupervised Machine Learning: The Yin Yang of Cybersecurity

In Chinese philosophy, the Yin and Yang represent how seemingly adverse poles might actually complement one another and .
1 2 3 4 5