New Video: MixMode Cyber Anomaly Detection Platform

We recently released a new video to better explain how MixMode’s next-generation cybersecurity anomaly detection platform combines the functionality of SIEM, NDR, NTA and UEBA for advanced threat detection, zero day attack identification, false positiv… Continue reading New Video: MixMode Cyber Anomaly Detection Platform

Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks

In our newest whitepaper, “Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks,” we dive into how traditional cybersecurity tools work, why this fundamentally limits them from being able to detect zero-day or pre… Continue reading Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks

Improving on the Typical SIEM Model

Despite its inherent flaws, today’s SIEM software solutions still shine when it comes to searching and investigating log data. One effective, comprehensive approach to network security pairs the best parts of SIEM with modern, AI-driven predictive anal… Continue reading Improving on the Typical SIEM Model

NTA and NDR: The Missing Piece

Most SIEM vendors acknowledge the value of network traffic data for leading indicators of attacks, anomaly detection, and user behavior analysis as being far more useful than log data. Ironically, network traffic data is often expressly excluded from S… Continue reading NTA and NDR: The Missing Piece

The Problem with Relying on Log Data for Cybersecurity

One of the most prevalent issues impacting the effectiveness of security teams who use SIEM as their primary means of threat detection and remediation is the fact that data logs are an attractive medium for modern hackers to exploit.
The post The Probl… Continue reading The Problem with Relying on Log Data for Cybersecurity

Guide: The Next Generation SOC Tool Stack – The Convergence of SIEM, NDR, and NTA

Traditional security vendors offering solutions like SIEM (Security Information and Event Management) are overpromising on analytics while also requiring massive spend on basic log storage, incremental analytics, maintenance costs, and supporting resou… Continue reading Guide: The Next Generation SOC Tool Stack – The Convergence of SIEM, NDR, and NTA

Guide: The Next Generation SOC Tool Stack – The Convergence of SIEM, NDR, and NTA

Traditional security vendors offering solutions like SIEM (Security Information and Event Management) are overpromising on analytics while also requiring massive spend on basic log storage, incremental analytics, maintenance costs, and supporting resou… Continue reading Guide: The Next Generation SOC Tool Stack – The Convergence of SIEM, NDR, and NTA

Secure The Wrong Path or Change The Path?

How do I configure a firewall appliance in public IaaS? How do I install anti-virus inside a container? How do I filter calls to microservices via an appliance in my DMZ? Now, what do these questions have in common?! They are all about using old approa… Continue reading Secure The Wrong Path or Change The Path?

Our “Applying Network-Centric Approaches for Threat Detection and Response” Paper Publishes

After many discussions and a bit of a re-write, our new paper “Applying Network-Centric Approaches for Threat Detection and Response” is finally ready (Gartner GTP access required). The abstract states “The escalating sophistication o… Continue reading Our “Applying Network-Centric Approaches for Threat Detection and Response” Paper Publishes