no code implementations • 14 Aug 2017 • Hagit Grushka-Cohen, Oded Sofer, Ofer Biller, Michael Dymshits, Lior Rokach, Bracha Shapira
Data leakage and theft from databases is a dangerous threat to organizations.
1 code implementation • 12 Jul 2017 • Michael Dymshits, Ben Myara, David Tolpin
We introduce a methodology for efficient monitoring of processes running on hosts in a corporate network.