Why Responding to a Cyber Attack with a Traditional SIEM Leaves You Vulnerable

An enterprise’s inability to detect cyber attacks has tangible effects on its productivity and profitability. Various reports have noted a correlation between the time it takes to spot an intrusion and the cost of recovery.
The post Why Responding to a… Continue reading Why Responding to a Cyber Attack with a Traditional SIEM Leaves You Vulnerable

Techiexpert: How Predictive AI Protects Against Ransomware, GANs and More

MixMode CTO and Chief Scientist, Igor Mezic, recently contributed an article for Techiexpert that examines three modern AI adversarial attacks, the financial toll they are having on some of our most important systems (including healthcare), and how pre… Continue reading Techiexpert: How Predictive AI Protects Against Ransomware, GANs and More

Stop Patching Leaks in Your Cybersecurity Boat: A Streamlined Cybersecurity AI Solution to Adversarial Attacks

At MixMode our one algorithm is capable of catching any anomaly that may appear on the network. In contrast, other security programs rely on a reactive method of patching and constantly adding to their algorithms each time a hack occurs so that the net… Continue reading Stop Patching Leaks in Your Cybersecurity Boat: A Streamlined Cybersecurity AI Solution to Adversarial Attacks

The Case Against Using a Frankenstein Cybersecurity Platform

The cybersecurity market has, simply put, been cobbled together. A tangled web of non-integrated systems and alerts from siloed systems. Enterprises are now being forced to utilize a “Frankenstein” of stitched together tools to create a platform that m… Continue reading The Case Against Using a Frankenstein Cybersecurity Platform

3 Reasons Why a Rule-Based Cybersecurity Platform Will Always Fail

When it comes to advancements in cybersecurity, rule-based systems are holding the industry back. Relying on humans to constantly input and label rules in order to detect and stay ahead of threats is a bottleneck process that is setting security teams … Continue reading 3 Reasons Why a Rule-Based Cybersecurity Platform Will Always Fail

What is Predictive AI and How is it Being Used in Cybersecurity?

The predictive AI field of machine learning collects, analyzes, and tests data to predict future possibilities. AI’s neurological network is patterned on the human brain. But AI works on a scale that goes far beyond what is humanly possible. The top us… Continue reading What is Predictive AI and How is it Being Used in Cybersecurity?

Why The Future of Cybersecurity Needs Both Humans and AI Working Together

A recent WhiteHat Security survey revealed that more than 70 percent of respondents cited AI-based tools as contributing to more efficiency. More than 55 percent of mundane tasks have been replaced by AI, freeing up analysts for other departmental task… Continue reading Why The Future of Cybersecurity Needs Both Humans and AI Working Together

MixMode CTO Responds to LeCun’s Self-Supervised AI Hopes

Yann LeCun and Yoshua Bengio were recently interviewed by VentureBeat Magazine on the topics of Self-supervised learning and human-level intelligence for AI. Our CTO Dr. Igor Mezic sat down with our team to discuss some of the most interesting pieces o… Continue reading MixMode CTO Responds to LeCun’s Self-Supervised AI Hopes

Self-Supervised Learning – The Third-Wave in Cybersecurity AI

The relationship between modern cybersecurity solutions and AI has become inextricable. The reality is that even the most talented and responsive SecOps teams would be unable to manually catch every threat posed to the sprawling, hybrid networks on whi… Continue reading Self-Supervised Learning – The Third-Wave in Cybersecurity AI

The Many Ways Your Employees Can Get Hacked While Working From Home and How to Respond

Although it is not surprising at all that hackers are taking advantage of the global pandemic —phishing threat reports are always highest when there is some natural disaster happening— we have never before had such an unsafe environment to … Continue reading The Many Ways Your Employees Can Get Hacked While Working From Home and How to Respond