Mixmode Blog
Lorem ipsum dolor sit amet, consectetur adipiscing elit.
MixMode Welcomes Seasoned Cybersecurity Leader Dan “Thor” Thormodsgaard as a Strategic Advisor
MixMode, a leading provider of self-learning solutions to detect cyberattacks in real time, announces that Dan “Thor” Thormodsgaard has joined the company as a Strategic Advisor. Thor will apply his 25 years of experience in IT Consulting, of which 19 were in IT Security Consulting, to support MixMode in strategic planning and partnerships.
Read MoreMixMode Team Members from Around the Globe Gather in Santa Barbara for MixMode Summit 2022
With the announcement of our Series B fundraising round, 2022 has catapulted us into a hyper-growth period for our company. With new team members joining rapidly and our product expanding exponentially, it was time that we hosted the first ever MixMode Summit!
Read MoreZero-day Exploit Discoveries Hit Record Numbers in 2021
The number of zero-day exploit discoveries hit record numbers in 2021, according to Google Project Zero. Instances of “in-the-wild 0-days” were up nearly double versus 2020, when only 25 0-day exploits were detected. In 2021, the total was 58.
Read MoreMaking an Informed Cloud Security Decision
Many organizations rely on neural networks driven by machine learning that relies on the accuracy of manually constructed training data. Training data errors lead to overlooked anomalous behavior and, often, mountains of false positive and negative flags that have to be reviewed by human analysts.
Read MoreThe Limitations of rules-Based Cybersecurity
Holistic insight into how high-level information is tied to specific accounts users is central to launching an effective security strategy. Unfortunately, all too often, SOC analysts find themselves applying human intelligence and comparing spreadsheet data to arrive at potential correlative values that may or may not be helpful or even accurate.
Read MoreThe Challenges of Hybrid Cloud Security Approaches
It is increasingly more common for organizations to adopt cloud computing in a hybrid fashion, keeping some on-premise infrastructure in place while moving select data to the cloud. While this approach may save on costs in the short term, hybrid solutions complicate organizational security postures.
Read MoreToo Many Cooks in the Kitchen: Why You Need to Consolidate Your Cybersecurity Approach
When it comes to cybersecurity, more is not always better. As new solutions have emerged in response to rapidly evolving technology and increasingly sophisticated cyber attacks, SOCs have added tool after tool to their arsenals.
Read MoreLocal U.S. Governments and Municipalities at Risk of Foreign Nation Cyber Attacks
Experts have warned that the Russia-Ukraine conflict poses an unprecedented cyber risk for U.S. organizations as well as State and local governments and municipalities.
Read MoreWHITEPAPER: Authentication Does Not Equal Zero Trust
Many vendor claims are unclear as to what they’re promising in this space, but they are quite insistent that without Zero Trust network architectures, organizations are at great risk for data breaches and other network sabotage.
Read More