-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathindex.xml
52 lines (41 loc) · 2.59 KB
/
index.xml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Cyberbotic</title>
<link>https://cyberbotic.io/</link>
<description>Recent content on Cyberbotic</description>
<generator>Hugo -- gohugo.io</generator>
<language>en</language>
<lastBuildDate>Wed, 31 Jul 2019 00:00:00 +0000</lastBuildDate>
<atom:link href="https://cyberbotic.io/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Acquisition</title>
<link>https://cyberbotic.io/blog/acquisition/</link>
<pubDate>Wed, 31 Jul 2019 00:00:00 +0000</pubDate>
<guid>https://cyberbotic.io/blog/acquisition/</guid>
<description><p>We are thrilled to annouce that Cyberbotic has been acquired by Zero-Point Security!</p></description>
</item>
<item>
<title>Why Machine Learning Is a Critical Defense Against Malware</title>
<link>https://cyberbotic.io/blog/ml/</link>
<pubDate>Mon, 17 Jun 2019 00:00:00 +0000</pubDate>
<guid>https://cyberbotic.io/blog/ml/</guid>
<description><p>That statement, which he made a couple of years ago, is even truer today.</p></description>
</item>
<item>
<title>Going Beyond Malware: The Rise of "Living off the Land" Attacks</title>
<link>https://cyberbotic.io/blog/lotl/</link>
<pubDate>Tue, 07 May 2019 00:00:00 +0000</pubDate>
<guid>https://cyberbotic.io/blog/lotl/</guid>
<description><p>You do not have the option to bring in supplies to maintain yourself. If you are looking for someone living off the land, you must hunt — as they have blended into their new environment.</p></description>
</item>
<item>
<title>About</title>
<link>https://cyberbotic.io/about/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>https://cyberbotic.io/about/</guid>
<description>What We Do Endpoint Detection and Response (EDR) is redefining the standard for eliminating the malware problem once and for all. By innovating artificial intelligence and machine learning, we are creating the solution by proactively preventing, rather than reactively detecting, the execution of malware threats.
Despite the cyber security industry continually evolving, malware detection has remained the same for decades. The approach has been linear whilst attackers have innovated and grown exponentially in sophistication - leaving organisations falling far behind.</description>
</item>
</channel>
</rss>