Misconceptions of the SOAR “Playbook”

Most customers are surprised to learn that SOAR platforms rely on invoking 3rd party technologies, including next-generation firewalls and endpoint protection platforms via traditional API calls to isolate and quarantine malicious threats and users.
Th… Continue reading Misconceptions of the SOAR “Playbook”

Building a Better SOC Based on What We Learned in 2020

Every network vulnerability opened new opportunities for hackers to infiltrate systems, steal data and wreak havoc. Several notable security incidents have left governments, private organizations, medical systems and large enterprise networks reeling. … Continue reading Building a Better SOC Based on What We Learned in 2020

Building a Better SOC Based on What We Learned in 2020

Every network vulnerability opened new opportunities for hackers to infiltrate systems, steal data and wreak havoc. Several notable security incidents have left governments, private organizations, medical systems and large enterprise networks reeling. … Continue reading Building a Better SOC Based on What We Learned in 2020

MixMode Named a 2021 Best Tech Startup in Santa Barbara

MixMode has been recognized as one of the best tech startups in Santa Barbara in 2021. Thank you to the staff at The Tech Tribune for this honor.
The post MixMode Named a 2021 Best Tech Startup in Santa Barbara appeared first on Security Boulevard.
Continue reading MixMode Named a 2021 Best Tech Startup in Santa Barbara

A Utility Company’s Barriers to Successful Network Oversight

The only truly workable network solution must bridge the inherent gaps that exist throughout [infrastructure] systems. It must also be capable enough to root out hidden vulnerabilities ripe for hacking.
The post A Utility Company’s Barriers to Successf… Continue reading A Utility Company’s Barriers to Successful Network Oversight

Our Top 2020 Cybersecurity Insights

The transition from office to remote environments was abrupt and one of the most defining moments that the cybersecurity industry and professionals faced in 2020. We wrote about the top issues CISOs were facing throughout the year but also doubled down… Continue reading Our Top 2020 Cybersecurity Insights

Russian Hack of U.S. Federal Agencies Shine Spotlight on SIEM Failures in Cybersecurity

In what the New York Times is calling, “One of the most sophisticated and perhaps largest hacks in more than five years,” malicious adversaries acting on behalf of a foreign government, likely Russian, broke into the email systems of multiple U.S. Fede… Continue reading Russian Hack of U.S. Federal Agencies Shine Spotlight on SIEM Failures in Cybersecurity

MixMode in the Real World: Customers Turn to MixMode Frustrated and in Search of a Viable SIEM Alternative

SIEM has failed to meet the needs of enterprises in the modern threatscape. One huge reason for this is that over time, most organizations will come to the sad realization that they will never achieve a full enterprise deployment of their SIEM. By its … Continue reading MixMode in the Real World: Customers Turn to MixMode Frustrated and in Search of a Viable SIEM Alternative

Featured Use Case: Why a Large US Utility Company Turned to MixMode to Address Utility Grid Vulnerabilities

A large utility company approached MixMode with the following scenario: The enterprise SOC was utilizing a shared SIEM application that was being utilized by several stakeholders: the networking team, the SCADA team, the dev-ops team, the compliance te… Continue reading Featured Use Case: Why a Large US Utility Company Turned to MixMode to Address Utility Grid Vulnerabilities

Recent Ransomware Attacks on U.S. Hospitals Highlight the Inefficiency of Rules-Based Cybersecurity Solutions

A number of recent high profile ransomware attacks on U.S. hospitals have demonstrated the urgency for organizations, municipalities, and critical services to take a proactive approach to protecting networks with a predictive AI solution.
The post Rece… Continue reading Recent Ransomware Attacks on U.S. Hospitals Highlight the Inefficiency of Rules-Based Cybersecurity Solutions