• Home
  • Authors
  • Yossi Naar

About Yossi Naar

Yossi Naar

Yossi Naar, Chief Visionary Officer and Co-Founder, is an accomplished software developer and architect. During his 20 years of industry experience, Yossi has designed and built many products, from cutting-edge security platforms for the defense industry to big data platforms for the AdTech / digital marketing industry as well as the Cybereason in-memory graph engine.

All posts by Yossi Naar

FBI Warns US Companies to Avoid Malicious USB Devices

The FBI issued a warning following a string of attacks allegedly by the FIN7 cybercrime group involving sending malicious USB thumb drives to targets...

January 10, 2022 / 3 minute read

Azurescape Vulnerability: More Evidence that  Microsoft Should Leave Security to the Experts

Microsoft is selling broken software and also offering to sell you the security tools to mitigate the risk they introduce. Microsoft should focus on securing its own products and leave cybersecurity to the experts...

September 13, 2021 / 2 minute read

BlackBerry QNX Vulnerability Highlights Lurking Issues with IOT Security

If your customers don’t demand security, and you aren’t rewarded for investing in it, there’s little market incentive to fix it by making the necessary investments. In fact, there’s generally a complete market failure when it comes to security, and IOT is no exception...

August 18, 2021 / 3 minute read

Evaluating XDR Against EDR, SIEM and SOAR Solutions

XDR, short for Extended Detection and Response, has emerged the best option for defending the modern corporate IT infrastructure...

May 19, 2021 / 3 minute read

Deepfakes: Novelty Trend or Novel Threat?

Deepfakes, a rapidly advancing technique for generating very realistic media, has the potential to be very disruptive when misused.

August 18, 2020 / 4 minute read

Smart Filtering, Smart Sampling and Smart Scaling

In security data analysis, hunting and AI-driven automated detection, the quality of your results depends heavily on the quality of your data. In this blog, I’d like to discuss a few strategies for handling the data and the advantages and disadvantages of each approach.

April 27, 2020 / 3 minute read

Irresistible forces must be met with immovable objects

Cybereason and ARM are teaming up to secure IoT devices. Here's how the two companies plan on using threat hunting powered by artificial intelligence to detect attackers that use connected devices as infiltration points to move laterally to networks.

October 17, 2018 / 5 minute read