Cybersecurity Spend for Data Retention and Analysis is Out of Control and Largely Unnecessary

Managing a relatively small, stable data store is one thing, but dynamic companies face immense challenges when those circumstances change. Data growth can become unwieldy to safeguard when it has to be carefully prepared through a series of time-consu… Continue reading Cybersecurity Spend for Data Retention and Analysis is Out of Control and Largely Unnecessary

The Aggregation Model is Falling Short

The following is an excerpt from our recent whitepaper, “Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks,” in which we dive into how traditional cybersecurity tools work, why this fundamentally limits them fr… Continue reading The Aggregation Model is Falling Short

Log Data is Not Effective as a Foundation for Prevention, Detection, Remediation or Analytics

In the imperfect, real world, where SOC teams actually live, the SIEM log-based approach is fundamentally flawed. In fact, it tends to add more challenge to the workday for SOC teams, not less.
The post Log Data is Not Effective as a Foundation for Pre… Continue reading Log Data is Not Effective as a Foundation for Prevention, Detection, Remediation or Analytics

Maximize ROI with Greater Efficacy Using Unsupervised AI

Within the first 24 hours after deployment, MixMode had enabled the government entity to regain control over the security environment and network data infrastructure. No longer limited to log data analysis, they were able to identify and address real-t… Continue reading Maximize ROI with Greater Efficacy Using Unsupervised AI

How Self-Supervised AI Tackles Ambiguity in Network Security

Cybersecurity vendors promise the moon when it comes to AI. As the recent TechRepublic article, “Why cybersecurity tools fail when it comes to ambiguity,” makes clear, often, these promises fail short in real world network environments.
The post How Se… Continue reading How Self-Supervised AI Tackles Ambiguity in Network Security

The Hidden Costs and Challenges of Log Data Storage Using a SIEM

Ultimately, MixMode found, the log-based SIEM approach resulted in five times the amount of data that needed to be stored, a cost that was passed along to the government entity.
The post The Hidden Costs and Challenges of Log Data Storage Using a SIEM … Continue reading The Hidden Costs and Challenges of Log Data Storage Using a SIEM

How a Government Entity Switched to MixMode and Decreased Data Storage Costs by 50%

Data is the beating heart of every modern organization, but it’s only valuable when it’s accessible, understandable, and most importantly, protected.
The post How a Government Entity Switched to MixMode and Decreased Data Storage Costs by 50% appeared … Continue reading How a Government Entity Switched to MixMode and Decreased Data Storage Costs by 50%

How Logging Eliminates Security Blindspots to Better Identify Threats

The digital landscape continues to grow increasingly complex, and security risk and operational costs rise as digital transformation accelerates. According to research by McKinsey and Company, more than 70 percent of security executives believe that t… Continue reading How Logging Eliminates Security Blindspots to Better Identify Threats

The Problem with Relying on Log Data for Cybersecurity

One of the most prevalent issues impacting the effectiveness of security teams who use SIEM as their primary means of threat detection and remediation is the fact that data logs are an attractive medium for modern hackers to exploit.
The post The Probl… Continue reading The Problem with Relying on Log Data for Cybersecurity

MixMode Now Supports Amazon VPC Flow logs

We’re excited to announce the general availability of support for Amazon Web Services’ VPC Flow Logs, in the MixMode platform! MixMode prides itself in offering a heterogeneous, “single pane of glass” view and analysis into multiple k… Continue reading MixMode Now Supports Amazon VPC Flow logs