Mixmode Blog
Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Webinar On-Demand: State of InfoSec Q3 2022
If you missed our recent webinar, State of InfoSec Q3 2022, we now have the full recording available on-demand!
Read MoreWebinar: State of InfoSec Q3 2022
Are you curious what threats other CISOs are prioritizing right now? Do you know what the most in-demand security talent is right now? Hundreds of Cybersecurity professionals recently responded to MixMode’s nation-wide survey on InfoSec strategies for the end of 2022.
Read MoreUpdated for 2022: What is Network Traffic Analysis? A Beginner’s Guide
87 percent of organizations use network traffic analysis (NTA) tools for threat detection and response according to ESG, an IT strategy firm. In their 2020 study, 43 percent of organizations surveyed said NTA is a “first line of defense” for detecting and responding to threats.
Read MoreCan Your Cyber Tools Monitor Any Stream of Data?
It’s the open secret no one’s talking about — too many cybersecurity solutions in the marketplace stand no chance of providing comprehensive coverage because they are incapable of handling data arising from all sources. Many available solutions are effectively legacy platforms hiding within fresh marketing packages.
Read MoreThe Fallacy of “One-Click Remediation”
Let’s take a closer look at the false narrative being propagated in the cybersecurity market and explore some more appropriate alternatives. An example of a legacy cyber tool vendor “feature” being touted as an ideal solution to the problem of automatic remediation is reliant on a standard (though rarely used for reasons we will explore in this article) function known as TCP Reset.
Read MoreUnderstanding the Evolution and Impact of AI on Cybersecurity
MixMode’s unsupervised, third-wave AI computes patterns of interaction over many different timescales, contrasting it over the next 5-minute interval with what was seen previously. Should patterns deviate, the platform performs an assessment of the security risk implied in that deviation and presents it to the user.
Read MoreUpdated for 2022: What is Network Detection and Response (NDR)? A Beginner’s Guide
Network detection and response, or NDR, has been established as a key tool for companies seeking to improve their threat response. It has become a network security strategy which developed in response to perceived shortcomings in existing network security systems.
Read MoreCustomer Case Study: Self-Learning Cyber Defense for Financial Institutions
The nation’s largest Financial Services providers are a favorite target for nation-state sponsored and coordinated cyber-attacks. Despite significantly more financial and resource investment in cybersecurity than any other industry, critical infrastructure breaches and novel attacks remain a daily occurrence.
Read MoreFalse Narratives in the Cybersecurity Tools Market
Mature cyber security teams understand a harsh reality often ignored by legacy cyber tools vendors: correlation must not be confused with causation.
Read More