Mixmode Blog

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Webinar On-Demand: State of InfoSec Q3 2022

By Christian Wiens | Sep 21, 2022

If you missed our recent webinar, State of InfoSec Q3 2022, we now have the full recording available on-demand!

Read More

Webinar: State of InfoSec Q3 2022

By Christian Wiens | Sep 7, 2022

Are you curious what threats other CISOs are prioritizing right now? Do you know what the most in-demand security talent is right now? Hundreds of Cybersecurity professionals recently responded to MixMode’s nation-wide survey on InfoSec strategies for the end of 2022.

Read More

Updated for 2022: What is Network Traffic Analysis? A Beginner’s Guide

By Christian Wiens | Aug 31, 2022

87 percent of organizations use network traffic analysis (NTA) tools for threat detection and response according to ESG, an IT strategy firm. In their 2020 study, 43 percent of organizations surveyed said NTA is a “first line of defense” for detecting and responding to threats.

Read More

Can Your Cyber Tools Monitor Any Stream of Data?

By Christian Wiens | Aug 24, 2022

It’s the open secret no one’s talking about — too many cybersecurity solutions in the marketplace stand no chance of providing comprehensive coverage because they are incapable of handling data arising from all sources. Many available solutions are effectively legacy platforms hiding within fresh marketing packages.

Read More

The Fallacy of “One-Click Remediation”

By Christian Wiens | Aug 17, 2022

Let’s take a closer look at the false narrative being propagated in the cybersecurity market and explore some more appropriate alternatives. An example of a legacy cyber tool vendor “feature” being touted as an ideal solution to the problem of automatic remediation is reliant on a standard (though rarely used for reasons we will explore in this article) function known as TCP Reset.

Read More

Understanding the Evolution and Impact of AI on Cybersecurity

By Dr. Igor Mezic | Aug 11, 2022

MixMode’s unsupervised, third-wave AI computes patterns of interaction over many different timescales, contrasting it over the next 5-minute interval with what was seen previously. Should patterns deviate, the platform performs an assessment of the security risk implied in that deviation and presents it to the user.

Read More

Updated for 2022: What is Network Detection and Response (NDR)? A Beginner’s Guide

By Christian Wiens | Aug 3, 2022

Network detection and response, or NDR, has been established as a key tool for companies seeking to improve their threat response. It has become a network security strategy which developed in response to perceived shortcomings in existing network security systems.

Read More

Customer Case Study: Self-Learning Cyber Defense for Financial Institutions

By Christian Wiens | Jul 28, 2022

The nation’s largest Financial Services providers are a favorite target for nation-state sponsored and coordinated cyber-attacks. Despite significantly more financial and resource investment in cybersecurity than any other industry, critical infrastructure breaches and novel attacks remain a daily occurrence.

Read More

False Narratives in the Cybersecurity Tools Market

By Christian Wiens | Jul 20, 2022

Mature cyber security teams understand a harsh reality often ignored by legacy cyber tools vendors: correlation must not be confused with causation.

Read More