The FBI issued a warning following a string of attacks allegedly by the FIN7 cybercrime group involving sending malicious USB thumb drives to targets...
January 10, 2022 / 3 minute read
Yossi Naar, Chief Visionary Officer and Co-Founder, is an accomplished software developer and architect. During his 20 years of industry experience, Yossi has designed and built many products, from cutting-edge security platforms for the defense industry to big data platforms for the AdTech / digital marketing industry as well as the Cybereason in-memory graph engine.
The FBI issued a warning following a string of attacks allegedly by the FIN7 cybercrime group involving sending malicious USB thumb drives to targets...
January 10, 2022 / 3 minute read
Microsoft is selling broken software and also offering to sell you the security tools to mitigate the risk they introduce. Microsoft should focus on securing its own products and leave cybersecurity to the experts...
September 13, 2021 / 2 minute read
If your customers don’t demand security, and you aren’t rewarded for investing in it, there’s little market incentive to fix it by making the necessary investments. In fact, there’s generally a complete market failure when it comes to security, and IOT is no exception...
August 18, 2021 / 3 minute read
XDR, short for Extended Detection and Response, has emerged the best option for defending the modern corporate IT infrastructure...
May 19, 2021 / 3 minute read
Deepfakes, a rapidly advancing technique for generating very realistic media, has the potential to be very disruptive when misused.
August 18, 2020 / 4 minute read
In security data analysis, hunting and AI-driven automated detection, the quality of your results depends heavily on the quality of your data. In this blog, I’d like to discuss a few strategies for handling the data and the advantages and disadvantages of each approach.
April 27, 2020 / 3 minute read
Cybereason and ARM are teaming up to secure IoT devices. Here's how the two companies plan on using threat hunting powered by artificial intelligence to detect attackers that use connected devices as infiltration points to move laterally to networks.
October 17, 2018 / 5 minute read
Get the latest research, expert insights, and security industry news.
Subscribe