How AI Can Help You Stay CCPA Compliant

Consider investing in emerging tech tools that can add a deeper layer of data privacy protection. Artificial intelligence technology, in particular, holds a great deal of promise when it comes to complying with the CCPA and improving the way companies … Continue reading How AI Can Help You Stay CCPA Compliant

Don’t Fall for the Hype – Marketing Myths in Artificial Intelligence for Cybersecurity

The cybersecurity provider landscape is cluttered with impossible claims, misrepresentations, and a confusing mix of inconsistent terminology. Worse, every minute you delay making a decision is another minute hackers have to gain access and knowledge a… Continue reading Don’t Fall for the Hype – Marketing Myths in Artificial Intelligence for Cybersecurity

Generative Unsupervised Learning vs. Discriminative Clustering Technology: Which Prevents Zero-Day Attacks?

Knowing the difference between Discriminative and Generative Unsupervised Learning can tell you a lot about the effectiveness of a cybersecurity solution’s artificial intelligence, for example, whether or not that security solution can perform ac… Continue reading Generative Unsupervised Learning vs. Discriminative Clustering Technology: Which Prevents Zero-Day Attacks?

How to Use Your Baseline for Network Security

This is the final article in a three-part series on Network Baselining. Read the first two articles in the series here:
1) An Introduction to Baselining Technology
2) How to Create a Baseline for Your Network
The post How to Use Your Baseline for Netwo… Continue reading How to Use Your Baseline for Network Security

Case Study: MixMode AI Detects Attack not Found on Threat Intel

In October, 2019 a MixMode customer experienced an incident where an external entity attacked a web server located in their DMZ, compromised it, and then pivoted internally through the DMZ to attempt access of a customer database. While the attacker wa… Continue reading Case Study: MixMode AI Detects Attack not Found on Threat Intel

An Introduction to Baselining Technology

This is the first installment of the three part blog series on creating baselines of network behavior to improve your security stance. Here we will walk you through the basics of baselining technology.
The post An Introduction to Baselining Technology … Continue reading An Introduction to Baselining Technology

Multi-Stream Cybersecurity and How it Can Save Your Business from a Zero-Day Attack

The best way to detect threats across an entire network in the quickest manner is to have complete visibility over every part of that network with a multi-stream platform which can incorporate not only network data, but Cloud Data and SIEM logs as well… Continue reading Multi-Stream Cybersecurity and How it Can Save Your Business from a Zero-Day Attack