Mixmode Blog
Lorem ipsum dolor sit amet, consectetur adipiscing elit.
SMB Companies Beware: The Ransomware Hunter is Aiming at You
Ransomware attackers aren’t always after the biggest fish. In fact, so-called “mid game hunting” — as opposed to “big game” hunting — where attackers identify smaller targets that are less likely to trigger a legal or governmental response, appears to be on the rise.
Read MoreFuse Show Recap: Rising Above the AI Marketing Noise in Cybersecurity
MixMode CEO, John Keister, was recently interviewed on Fuse – a video-based interview show where the founders of xFusion.io have conversations with entrepreneurs, business owners, and thought leaders of the startup world.
Read MoreThe History and Current State of Ransomware Attacks
Ransomware uses a variety of attack techniques, including phishing where it can be very difficult for a human to discern whether an email is safe or not. These attacks usually impact the operations of a company immediately, and the recent rise in Ransomware attacks coincides closely with the rise of cryptocurrency as hackers are able to demand payment in untraceable forms like Bitcoin.
Read MoreWhat is Killware: How to Protect Yourself from these Next-Generation Cyberattacks
Not long ago, the concept of killware was the stuff of futuristic, doomsday movie fare. The idea that hackers could breach systems related to basic public infrastructure and health services to put people’s very lives at risk seemed scary, but far-fetched. Unfortunately, that dystopian future has, at least to some degree, arrived.
Read MoreVideo: The Exponential Data Problem with Legacy Cybersecurity Tool Stacks
MixMode’s Head of Sales and Alliances, Geoff Coulehan, understands first-hand the challenges current and incoming MixMode customers are facing with their unwieldy cybersecurity tool stacks.
Read MoreWhy VPC Flow Logs Are Critical for Comprehensive Cybersecurity Approaches
VPC (virtual private cloud) flow log data contains a wealth of data that can be utilized to gain a clear understanding of a network’s security posture. However, it can be challenging and prohibitively time-consuming for analysts to get a handle on the voluminous number of flow logs.
Read MoreUnderstanding CloudTrail and Why it Matters in Cybersecurity
CloudTrail is a valuable data source that provides insights into API calls used to access AWS accounts, but the service poses several high-level Cybersecurity challenges.
Read MoreDependence on Log Data | Twenty-first Century Networks Require Twenty-first Century Security Solutions
When Cybersecurity teams assume that log-based platforms are the best available network security solutions, they have made a decision to invest in “bad gas.” These products will cost more and deliver less than systems enhanced by context-aware AI.
Read MoreMixMode Recognized by CyberSecurity Breakthrough Awards Program for Overall Network Security Solution of the Year
MixMode, the leader in AI-driven, real-time anomaly detection for Cybersecurity, was named the winner of the “Overall Network Security Solution of the Year” award in the 2021 CyberSecurity Breakthrough Awards program conducted by CyberSecurity Breakthrough.
Read More