Mixmode Blog
Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Top 5 Takeaways from the CISA 2023-2025 Strategic Plan That the Cybersecurity Community Should Know About
CISA identifies goals for the strategy as spearheading “the national effort to ensure the defense and resilience of cyberspace,” helping partners protect critical infrastructure, and supporting stronger “whole-of-nation operational collaboration and information sharing.” The strategy also outlines internal CISA goals focused on unification within the agency.
Read MoreHow to Detect PowerDrop Command & Control Malware
MixMode Sales Engineer, Josh Snow, explores a real-time threat detection use case involving The MixMode Platform and its ability to identify PowerDrop, a malicious Powershell script that has been specifically targeting the aerospace industry and shows how MixMode’s Third Wave AI detects PowerDrop and gain insights into what this threat entails.
Read MoreUtilizing Generative AI Effectively in Cybersecurity
Generative AI tools have the potential to enhance various aspects of cybersecurity, from data augmentation and malware detection to anomaly detection and security testing. By harnessing the power of Generative AI, organizations can strengthen their defenses, improve threat detection capabilities, and enhance their overall cybersecurity posture.
Read MoreHow to Use The MixMode Platform to Discover NTLM Authentication and Validate Windows SMB Signing Requirements
NTLM (New Technology Land Manager) has been a protocol used for over 20 years, but it suffers from weak cryptography and vulnerabilities like NTLM relay attacks. In this video, we explore the implications of this change, the importance of identifying NTLM in your infrastructure, and how MixMode can help in this process.
Read MoreAI Offers Potential to Enhance The U.S. Department of Homeland Security
The establishment of the AI Task Force by the DHS demonstrates a commitment to harnessing the potential of AI in addressing emerging threats and safeguarding national security. By leveraging AI technology in various areas, such as supply chain integrity, countering drug trafficking, combating online child exploitation, and securing critical infrastructure, the DHS aims to stay ahead of evolving risks and protect the nation more effectively.
Read MoreRAVENii Uses MixMode Cloud Detection for AWS to Stop Insider Attack
RAVENii, a leading managed services provider, was launched in 2014, bringing decades of front-line experience across many cybersecurity domains; while harnessing the power of its global network of seasoned security experts to keep abreast of the ever-changing threat landscape. Today, RAVENii supports multiple organizations with its “Gray Matter” approach to cybersecurity in an unceasing effort […]
Read MoreMixMode’s Key Takeaways from the 2023 Gartner® Emerging Tech: Security— Improve Threat Detection and Response With AI-Based Behavioral Indications Report
Gartner recently released their newest report titled “Emerging Tech: Security – Improve Threat Detection and Response With AI-Based Behavioral Indications” which covers the emergent need for new AI-Based methods of using behavioral patterns to identify threats.
Read MoreEvolving Role of the CISO: From IT Security to Business Resilience
With more and more large organizations relying on technology to conduct business, the need for a skilled CISO has become increasingly important. No longer just overseeing IT security efforts, the CISO is now responsible for a wide range of cyber defenses from data protection to compliance and even physical security.
Read MoreForbes Technology Council: The Cybersecurity Implications Of ChatGPT And Third Wave Generative AI Models
Although generative models have been in development for some time, ChatGPT’s public release has raised important questions about the nature of these models, their potential impact, and their role in fields like cybersecurity. To understand their significance, Dr. Mezic explores the history and development of AI, distinguishes between the different waves of AI technology, and ultimately the implications for cybersecurity.
Read More