sign up for our newsletter
X
Technology
Product
For Enterprises
For MSSPs
Vendor Integration
Citations & Awards
Resources
Brochures
White Papers
Use Cases
Webinars
Videos
Customer Success
Company
About
Leadership
Partners
Careers
News
PR
Events
Blog
Contact us
Play
Demo
TRY IT
Threat Detection & Investigation Blog
Cyber Defense
Cyber Security
Malware
Is Hotel Cyber Security Sleeping on the Job?
When we think of burglars breaking into a house, our minds conjure up images of knitted hat-covered criminals grabbing .
January 16
By
Arie Fred, VP of Product, SecBI
Read More
Network & Traffic
CrowdStrike
Zscaler
Reflections on the CrowdStrike - Zscaler Partnership
I was always troubled by the lack of complete visibility in the network.
November 6
By
Arie Fred, VP of Product, SecBI
Read More
Threat Detection
Cyber Security
Malware
Github
Bank leaves sensitive data exposed on GitHub repositories
A North American bank stored highly sensitive digital property in a series of publicly open and accessible GitHub .
September 25
By
Arie Fred, VP of Product, SecBI
Read More
Crypto-Currency
Threat Detection
Cyber Security
Crypto Mining
Crypto mining- deep, dark and profitable
Crypto-mining (or crypto-jacking) malware campaigns climbed 29 percent from Q4 2018 to Q1 2019 according to a new study .
September 9
By
Arie Fred, VP of Product, SecBI
Read More
Cyber Security
Malware
Malware detection
Encryption
Encryption, a friend or foe of cybersecurity?
Encryption has been hailed as the savior of security and privacy online. Enterprises across the globe are increasingly .
August 26
By
Arie Fred, VP of Product, SecBI
Read More
Network & Traffic
Threat Detection
AI Cyberattacks
Living Off the Land
AI-based endpoint protection (EDR or AV) can be fooled a.k.a. our AI is bigger than yours
Last week, security researchers announced to the world that they have managed to outsmart one of the most popular EDR .
July 25
By
Arie Fred, VP of Product, SecBI
Read More
1
2
3
4
Categories
Categories
"Analytics"
(1)
"Deception"
(2)
"Incident Response"
(3)
"SIEM"
(2)
AI Cyberattacks
(3)
Command & Control
(1)
CrowdStrike
(1)
Crypto Mining
(1)
Crypto-Currency
(3)
Cyber Defense
(6)
Cyber Security
(15)
Cybersecurity Awareness Month
(1)
CyberTech
(1)
cyberweek
(1)
Email Gateway
(1)
Encryption
(1)
Github
(1)
IoT Security
(2)
Living Off the Land
(1)
LockerGoga
(1)
Machine Learning
(2)
Malware
(5)
Malware detection
(1)
Network & Traffic
(28)
NotPetya
(1)
Ransomware
(11)
SaaS
(1)
security event management
(1)
Threat Detection
(17)
Trends
(1)
wannacry
(1)
Web Gateway
(1)
Zscaler
(1)
see all
Share with your audience