Mixmode Blog

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Dependence on Log Data | The Limitations, Hidden Costs, and Additive Nature of SIEM

By Christian Wiens | Sep 28, 2021

ou may be surprised to learn that log data is proprietary to each security platform vendor. There is no standard format or even a standard labeling mechanism. Your data only has context within the parameters of your SIEM vendor.

Read More

Dependence on Log Data | An Increasing Vulnerability to Threat Actors

By Christian Wiens | Sep 24, 2021

How sure are you that log files represent the best source of information to base your entire Cybersecurity program upon? Log data is the cornerstone of every traditional cybersecurity platform including SIEM (Security Information and Event Management), UEBA (User and Entity Behavior Analytics), and xDR (Detection and Response).

Read More

MixMode Joins 5G Open Innovation Lab, Bringing Self-Learning AI to the 5G Ecosystem

By Christian Wiens | Sep 20, 2021

MixMode, the leader in AI-driven, real-time anomaly detection for Cybersecurity, has formally joined the 5G Open Innovation Lab’s (“5GOILab”) Fall 2021 program. The Lab is supported by its founding and corporate partners which include Amdocs, Dell Technologies, F5, Intel, Microsoft, NASA, T-Mobile and VMware.

Read More

10 Eye-Opening Data Breach Statistics (and How You Can Better Protect Your Network)

By Christian Wiens | Sep 16, 2021

While we’re seeing more data breaches than in years past, being proactive can make an enormous difference. Head-in-sand is not the optimal position for any modern organization with a network-based infrastructure. Education about the nature of modern data breaches is a great place to start.

Read More

What is Zero-Trust in Cybersecurity?

By Christian Wiens | Sep 8, 2021

orrester coined the term zero-trust in 2010 to describe the idea that nothing is inherently safe and that everything must be continuously verified. You may have heard the motto, “Trust nothing; verify everything.” This is a great way to think about zero-trust in Cybersecurity. 

Read More

DarkReading: Superhero Loki Lurks Like a Zero-Day Threat

By Matt Shea | Sep 1, 2021

Just like the SOC analyst, the TVA has to find these threats and remove them as quickly as possible. Let’s say you are tasked with being this TVA agent and are told you need to search all the timelines (an almost infinite number of them) and find all the Loki variants to have them removed.

Read More

What is Zero-Day Attack Identification?

By Christian Wiens | Aug 25, 2021

Zero-day attacks are among the most challenging Cybersecurity threats SOC teams face on a regular basis. These “never before seen” threats can surprise organizations even if they are protected by traditional Cybersecurity systems.

Read More

MixMode Featured In Latest Gartner Report on Emerging Trends in Network Detection and Response

By Christian Wiens | Aug 17, 2021

MixMode announced today their inclusion in the 2021 Gartner report, ‘Emerging Trends: Top Use Cases for Network Detection and Response.’ The report, available only to Gartner users, provides in depth analysis on the top four use cases driving the NDR market including detection, hunting, forensics and response, as well as NDR development recommendations for product leaders.

Read More

What is SIEM and How Has It Evolved?

By Christian Wiens | Aug 11, 2021

Security information and event management (SIEM) is a security management approach that combines two core functions: SIM (security information management) and SEM (security event management).

Read More