• Home
  • Authors
  • Yonatan Striem-Amit

About Yonatan Striem-Amit

Yonatan Striem-Amit

Yonatan Striem-Amit, CTO and Co-Founder of Cybereason, is a machine learning, big data analytics and visualization technology expert, with over a decade of experience applying analytics to security in the Israeli Defense Forces and Israeli Governmental Agencies.

All posts by Yonatan Striem-Amit

Cybersecurity is National Security

President Biden invited tech CEOs to the White House to improve cybersecurity across the nation - the summit resulted in some bold initiatives that are a step in the right direction, but there is still more to be done...

September 2, 2021 / 2 minute read

Cybereason and Intel Introduce Hardware-Enabled Ransomware Protections for Businesses

Cybereason® is pleased to announce our collaboration with Intel® Hardware Shield to provide robust protection against ransomware attacks at machine speed.

January 11, 2021 / 2 minute read

Why a Cloud-Native EPP is Critical for Futureproof Security Operations

Among endpoint solutions, there’s a staggeringly clear distinction between solutions that are cloud-native and those whose cloud capabilities are either non-existent or partial at best.

May 19, 2020 / 2 minute read

Cybereason Mobile: Another Step Towards Our Vision to Protect it All

Today, we take another step towards our vision to protect it all by releasing a new offering to defend mobile devices: Cybereason Mobile.

April 23, 2020 / 2 minute read

Remote Work is the New Normal

With more and more employees encouraged to isolate and stay in their homes, a big question on every CEO’s mind is how to ensure her business is able to continue to function when all employees are remote.

March 23, 2020 / 5 minute read

What are the Spectre and Meltdown CPU vulnerabilities

What the Spectre and Meltdown bugs mean for endpoint security and offers mitigation measures that users can implement

January 4, 2018 / 3 minute read

The challenge of offensive hacking: the NSA and zero days

The NSA could find itself in an ethical bind now that its supposed offensive hacking tools are in the public domain and can be easily used against businesses. But how does the U.S. government balance

August 19, 2016 / 3 minute read