Magnify Podcast: Discussing the New Normal with AI Based Cybersecurity Specialists, MixMode

Geoff Coulehan, MixMode’s Head of Strategic Alliances, joined Secrutiny’s “Magnify Podcast,” to discuss the priorities CISOs should focus on to better protect their now-remote team of employees.
The post Magnify Podcast: Discussing the New Normal with … Continue reading Magnify Podcast: Discussing the New Normal with AI Based Cybersecurity Specialists, MixMode

Guide: How to Choose an AI-Based Cybersecurity Platform

Most cybersecurity vendors today tout some form of “Artificial Intelligence” as an underlying mechanism for the differentiation of their product among the market. But if everyone is saying they have AI, and everyone is also claiming theirs … Continue reading Guide: How to Choose an AI-Based Cybersecurity Platform

Webinar Recap: The Next-Generation AI Powered SOC Platform

One thing is clear: more spend does not equal more security and the next generation of cybersecurity tools will route out these inefficiencies.
The post Webinar Recap: The Next-Generation AI Powered SOC Platform appeared first on Security Boulevard.
Continue reading Webinar Recap: The Next-Generation AI Powered SOC Platform

Deep Dive: How much time do security teams spend labeling with Supervised Learning?

Many CISOs and SecOps teams were faced with a gut-wrenching choice: addressing the operational challenges of keeping workers connected, or shoring up vulnerabilities before hackers exploited them. Both options involved time-consuming, repetitive, manua… Continue reading Deep Dive: How much time do security teams spend labeling with Supervised Learning?

Our Q2 Top Cybersecurity Insights

Since we determine everything on data here at MixMode, we went into our website data to see which of our Q2 articles got the most traffic over the past few months. Not surprisingly, the majority of our top articles covered topics on the advancement of … Continue reading Our Q2 Top Cybersecurity Insights

NTA and NDR: The Missing Piece

Most SIEM vendors acknowledge the value of network traffic data for leading indicators of attacks, anomaly detection, and user behavior analysis as being far more useful than log data. Ironically, network traffic data is often expressly excluded from S… Continue reading NTA and NDR: The Missing Piece

The Problem with Relying on Log Data for Cybersecurity

One of the most prevalent issues impacting the effectiveness of security teams who use SIEM as their primary means of threat detection and remediation is the fact that data logs are an attractive medium for modern hackers to exploit.
The post The Probl… Continue reading The Problem with Relying on Log Data for Cybersecurity

The (Recent) History of Self-Supervised Learning

Real unsupervised AI spots security issues sooner and predicts future behavior more accurately than older first- and second-wave solutions. Self-supervised AI technology draws on an understanding of the fundamental nature of the network where it lives,… Continue reading The (Recent) History of Self-Supervised Learning

Guide: The Next Generation SOC Tool Stack – The Convergence of SIEM, NDR, and NTA

Traditional security vendors offering solutions like SIEM (Security Information and Event Management) are overpromising on analytics while also requiring massive spend on basic log storage, incremental analytics, maintenance costs, and supporting resou… Continue reading Guide: The Next Generation SOC Tool Stack – The Convergence of SIEM, NDR, and NTA

Guide: The Next Generation SOC Tool Stack – The Convergence of SIEM, NDR, and NTA

Traditional security vendors offering solutions like SIEM (Security Information and Event Management) are overpromising on analytics while also requiring massive spend on basic log storage, incremental analytics, maintenance costs, and supporting resou… Continue reading Guide: The Next Generation SOC Tool Stack – The Convergence of SIEM, NDR, and NTA