Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Hexadite Wants to Outsource Your Cyber Security- to Machines

byEileen McNulty
August 15, 2014
in News

Eran Barak, CEO of security startup Hexadite believes that security technology has become very sophisticated with the vast majority of applications and services concentrating on detection. Once a problem within the system is identified, it requires a solution — and there are significantly fewer solutions around to do that, and none of them automated.

Cyber security startup Hexadite, which provides an Automated Cyber Incident Response Solution, was launched by three former Israeli intelligence officials, and came out of stealth mode in July to announce $2.5m in seed funding round.

“Hexadite creates a paradigm shift in the cybersecurity incident response market by automating and vastly accelerating previously manual processes,” points out Yoav Leitersdorf, managing partner for YL Ventures.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

“No one can possibly go through the log files that record intrusion attempts and figure out what they mean in the context of an attack,” Barak said. “Security today is very much a big data play not only because of the volume of data that must be checked, but because of the sophistication of attacks.”

Malware can incubate for months before it is activated, and the chances of tracking it down under those circumstances — where a file is surreptitiously installed onto a system but doesn’t do anything — are extremely low, because administrators don’t even know what they are looking at, Barak said.

Essentially, Hexadite is the ‘outsourcing’ of IT security — to machines. Question regarding the willingness of corporations and enterprises to hand over control of their sensitive tech infrastructure remain unanswered.

Read more here.
(Featured image credit: Hexadite)

Follow @DataconomyMedia

Related Posts

Microsoft’s biggest-ever Patch Tuesday fixes 175 bugs

Microsoft’s biggest-ever Patch Tuesday fixes 175 bugs

October 15, 2025
Jensen Huang says every Nvidia engineer now codes with Cursor

Jensen Huang says every Nvidia engineer now codes with Cursor

October 15, 2025
Apple unveils new iPad Pro with the M5 chip

Apple unveils new iPad Pro with the M5 chip

October 15, 2025
Apple Vision Pro gets M5 chip upgrade and PS VR2 controller support

Apple Vision Pro gets M5 chip upgrade and PS VR2 controller support

October 15, 2025
Attackers used AI prompts to silently exfiltrate code from GitHub repositories

Attackers used AI prompts to silently exfiltrate code from GitHub repositories

October 15, 2025
Android 16 now shows which apps sneak in your security settings

Android 16 now shows which apps sneak in your security settings

October 15, 2025
Please login to join discussion

LATEST NEWS

Microsoft’s biggest-ever Patch Tuesday fixes 175 bugs

Jensen Huang says every Nvidia engineer now codes with Cursor

Apple unveils new iPad Pro with the M5 chip

Apple Vision Pro gets M5 chip upgrade and PS VR2 controller support

Attackers used AI prompts to silently exfiltrate code from GitHub repositories

Android 16 now shows which apps sneak in your security settings

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.