Mixmode Blog
Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Better Anomaly Detection Is Key to Solving the False Positive Problem Once and for All
Keeping up with security alerts can be a Herculean task without the right tools on board. Security teams face more than 11,000 alerts per day on average, according to industry analysts — including thousands of false positives triggered by legacy security solutions.
Read MoreVIDEO: The Multiplying costs and challenges of Data Storage and Retention in Legacy Cybersecurity Platforms
MixMode’s Head of Sales and Alliances, Geoff Coulehan, discusses the data retention cost and challenges that arise when legacy cybersecurity platforms require historical data to be organized in a proprietary format for after-the-fact investigation processes.
Read MoreForbes: Comparing Legacy Rules-Based Cybersecurity Platforms And AI-Based Platforms
Chief Scientist and CTO for MixMode, Igor Mezic, wrote this article for Forbes magazine on the advantages of moving away from a legacy rule-based cybersecurity platform to a third-wave AI platform that can better detect zero-day threats.
Read MoreMixMode Platform Release: New Executive Summary Dashboard
The MixMode Executive Summary Dashboard provides the necessary information and continuous access to critical details that CISO’s and other cybersecurity leaders need to see on a weekly and monthly basis to understand the health of their cybersecurity program.
Read MoreCybersecurity Acronyms: Making Sense of the Alphabet Soup
Trying to decipher Cybersecurity jargon can feel like trying to make sense out of a spoonful of alphabet soup. Is your SIEM equipped with sufficient NTA? What about your XDR? Or wait, was it NDR? What’s IRM, anyway? And whatever happened to UEBA?
Read MoreModern Ransomware Attackers Risking Public Safety, Community Infrastructure
Ransomware attackers often find government networks to be lucrative sitting targets that are often largely left unprotected against modern threats. As CNN reports, state and local governments tend to lack enough money and personnel to effectively mitigate these threats.
Read MoreVideo: The Limits of Rules-BasED Cybersecurity Systems
MixMode’s CTO and Chief Scientist, Dr. Igor Mezic, discusses the challenges of rules-based cybersecurity systems. He focuses on the workflow issues for security analysts that operate in first and second-wave AI (rules-based) cybersecurity tools.
Read More5 Critical Factors That Impact an Organization’s Cybersecurity Efficacy
It’s no surprise that organizations are pouring resources into their security approaches, from investments into hardware and software and significant increases in Cybersecurity professional hiring. In fact, industry watchers expect organizations globally to contribute to $1.75 trillion in cumulative spending on Cybersecurity between 2021 and 2025.
Read MoreHow CIOs Will Allocate Budgets in 2022 to Confront Complex Cybersecurity Threats
An annual Harvey Nash Group/KPMG survey of CIOs and other IT leaders revealed that companies spent about $15 billion more each week in the early part of 2021 on work-from-home investments, a figure that represents one of the largest upticks in tech investment in history, according to Harvey Nash/KPMG.
Read More