New Video: MixMode Cyber Anomaly Detection Platform

We recently released a new video to better explain how MixMode’s next-generation cybersecurity anomaly detection platform combines the functionality of SIEM, NDR, NTA and UEBA for advanced threat detection, zero day attack identification, false positiv… Continue reading New Video: MixMode Cyber Anomaly Detection Platform

The Top 5 Considerations That Should Guide Your SOC Strategy in 2021 and Beyond

It’s evident that while organizations are spending more and more on legacy cybersecurity solutions, these platforms are not holding up their end of the deal and are not able to proactively defend in a modern, non-signature attack threatscape.
The post … Continue reading The Top 5 Considerations That Should Guide Your SOC Strategy in 2021 and Beyond

Third-wave AI has Proven More Effective than Traditional Cybersecurity Platforms and Methodologies

Unfortunately, the majority of cybersecurity solutions available today rely on outdated applications for AI. So-called first- and second-wave AI solutions don’t cut it, but few vendors have the technical capabilities and know-how to apply cutting edge,… Continue reading Third-wave AI has Proven More Effective than Traditional Cybersecurity Platforms and Methodologies

The Aggregation Model is Falling Short

The following is an excerpt from our recent whitepaper, “Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks,” in which we dive into how traditional cybersecurity tools work, why this fundamentally limits them fr… Continue reading The Aggregation Model is Falling Short

How AI is Contributing to Global Warming and What it Can Learn from Bitcoin

What does Bitcoin’s energy consumption problem have to do with AI? At a fundamental level, it turns out, some AI applications require similarly massive amounts of computing energy to function.
The post How AI is Contributing to Global Warming and What … Continue reading How AI is Contributing to Global Warming and What it Can Learn from Bitcoin

A Modern SOC Should Not Be Entirely Dependent On Human Operators and Their Personal Experience

A modern SOC should not be entirely dependent on human operators and their personal experience. The issue has been a foundational problem with not only the methodologies used by SOCs for the past 15 to 20 years, but it should be questioned whether the … Continue reading A Modern SOC Should Not Be Entirely Dependent On Human Operators and Their Personal Experience

How Self-Supervised AI Tackles Ambiguity in Network Security

Cybersecurity vendors promise the moon when it comes to AI. As the recent TechRepublic article, “Why cybersecurity tools fail when it comes to ambiguity,” makes clear, often, these promises fail short in real world network environments.
The post How Se… Continue reading How Self-Supervised AI Tackles Ambiguity in Network Security

The Hidden Costs and Challenges of Log Data Storage Using a SIEM

Ultimately, MixMode found, the log-based SIEM approach resulted in five times the amount of data that needed to be stored, a cost that was passed along to the government entity.
The post The Hidden Costs and Challenges of Log Data Storage Using a SIEM … Continue reading The Hidden Costs and Challenges of Log Data Storage Using a SIEM

2021: The Year SOCs Embrace Cybersecurity Convergence

Staying on top of cybersecurity risk can feel like a losing battle in today’s modern, hyperconnected reality. The influx of IoT devices and increased reliance of BYOD devices has created a diverse, complex threatscape rife with overlapping vulnerabilit… Continue reading 2021: The Year SOCs Embrace Cybersecurity Convergence

Why Responding to a Cyber Attack with a Traditional SIEM Leaves You Vulnerable

An enterprise’s inability to detect cyber attacks has tangible effects on its productivity and profitability. Various reports have noted a correlation between the time it takes to spot an intrusion and the cost of recovery.
The post Why Responding to a… Continue reading Why Responding to a Cyber Attack with a Traditional SIEM Leaves You Vulnerable