Yesterday’s SIEM Solutions Can’t Combat Today’s Cyberthreats

While it’s true that having a SIEM is better than forgoing network monitoring all together, a standalone SIEM solution is simply insufficient in today’s cybersecurity landscape. Hackers and other bad actors have become more sophisticated –… Continue reading Yesterday’s SIEM Solutions Can’t Combat Today’s Cyberthreats

Our Top 5 Cybersecurity Insights from 2019

This year on the MixMode blog, we have covered headline stories, analyzed every pain point within network security, and shared what we believe to be some of the most innovative solutions to help you analyze network traffic, surface threats and anomalie… Continue reading Our Top 5 Cybersecurity Insights from 2019

Our Top 5 Cybersecurity Insights from 2019

This year on the MixMode blog, we have covered headline stories, analyzed every pain point within network security, and shared what we believe to be some of the most innovative solutions to help you analyze network traffic, surface threats and anomalie… Continue reading Our Top 5 Cybersecurity Insights from 2019

What Trends Will Shape the Cybersecurity Industry in 2020?

In this environment, it’s no surprise that U.S. CEOs rated cybersecurity as their top external concern in a survey conducted by the Conference Board. Those worries are unlikely to fade anytime soon, but 2020 also brings fresh opportunities for pr… Continue reading What Trends Will Shape the Cybersecurity Industry in 2020?

Generative Unsupervised Learning vs. Discriminative Clustering Technology: Which Prevents Zero-Day Attacks?

Knowing the difference between Discriminative and Generative Unsupervised Learning can tell you a lot about the effectiveness of a cybersecurity solution’s artificial intelligence, for example, whether or not that security solution can perform ac… Continue reading Generative Unsupervised Learning vs. Discriminative Clustering Technology: Which Prevents Zero-Day Attacks?

How to Use Your Baseline for Network Security

This is the final article in a three-part series on Network Baselining. Read the first two articles in the series here:
1) An Introduction to Baselining Technology
2) How to Create a Baseline for Your Network
The post How to Use Your Baseline for Netwo… Continue reading How to Use Your Baseline for Network Security

Case Study: MixMode AI Detects Attack not Found on Threat Intel

In October, 2019 a MixMode customer experienced an incident where an external entity attacked a web server located in their DMZ, compromised it, and then pivoted internally through the DMZ to attempt access of a customer database. While the attacker wa… Continue reading Case Study: MixMode AI Detects Attack not Found on Threat Intel

An Introduction to Baselining Technology

This is the first installment of the three part blog series on creating baselines of network behavior to improve your security stance. Here we will walk you through the basics of baselining technology.
The post An Introduction to Baselining Technology … Continue reading An Introduction to Baselining Technology

Multi-Stream Cybersecurity and How it Can Save Your Business from a Zero-Day Attack

The best way to detect threats across an entire network in the quickest manner is to have complete visibility over every part of that network with a multi-stream platform which can incorporate not only network data, but Cloud Data and SIEM logs as well… Continue reading Multi-Stream Cybersecurity and How it Can Save Your Business from a Zero-Day Attack