Mixmode Blog

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Why VPC Flow Logs Are Critical for Comprehensive Cybersecurity Approaches

By Russell Gray | Oct 19, 2021

VPC (virtual private cloud) flow log data contains a wealth of data that can be utilized to gain a clear understanding of a network’s security posture. However, it can be challenging and prohibitively time-consuming for analysts to get a handle on the voluminous number of flow logs.

Read More

Understanding CloudTrail and Why it Matters in Cybersecurity

By Russell Gray | Oct 13, 2021

CloudTrail is a valuable data source that provides insights into API calls used to access AWS accounts, but the service poses several high-level Cybersecurity challenges.

Read More

Dependence on Log Data | Twenty-first Century Networks Require Twenty-first Century Security Solutions

By Christian Wiens | Oct 7, 2021

When Cybersecurity teams assume that log-based platforms are the best available network security solutions, they have made a decision to invest in “bad gas.” These products will cost more and deliver less than systems enhanced by context-aware AI.

Read More

MixMode Recognized by CyberSecurity Breakthrough Awards Program for Overall Network Security Solution of the Year

By Christian Wiens | Oct 6, 2021

MixMode, the leader in AI-driven, real-time anomaly detection for Cybersecurity,  was named the winner of the “Overall Network Security Solution of the Year” award in the 2021 CyberSecurity Breakthrough Awards program conducted by CyberSecurity Breakthrough.

Read More

Dependence on Log Data | The Limitations, Hidden Costs, and Additive Nature of SIEM

By Christian Wiens | Sep 28, 2021

ou may be surprised to learn that log data is proprietary to each security platform vendor. There is no standard format or even a standard labeling mechanism. Your data only has context within the parameters of your SIEM vendor.

Read More

Dependence on Log Data | An Increasing Vulnerability to Threat Actors

By Christian Wiens | Sep 24, 2021

How sure are you that log files represent the best source of information to base your entire Cybersecurity program upon? Log data is the cornerstone of every traditional cybersecurity platform including SIEM (Security Information and Event Management), UEBA (User and Entity Behavior Analytics), and xDR (Detection and Response).

Read More

MixMode Joins 5G Open Innovation Lab, Bringing Self-Learning AI to the 5G Ecosystem

By Christian Wiens | Sep 20, 2021

MixMode, the leader in AI-driven, real-time anomaly detection for Cybersecurity, has formally joined the 5G Open Innovation Lab’s (“5GOILab”) Fall 2021 program. The Lab is supported by its founding and corporate partners which include Amdocs, Dell Technologies, F5, Intel, Microsoft, NASA, T-Mobile and VMware.

Read More

10 Eye-Opening Data Breach Statistics (and How You Can Better Protect Your Network)

By Christian Wiens | Sep 16, 2021

While we’re seeing more data breaches than in years past, being proactive can make an enormous difference. Head-in-sand is not the optimal position for any modern organization with a network-based infrastructure. Education about the nature of modern data breaches is a great place to start.

Read More

What is Zero-Trust in Cybersecurity?

By Christian Wiens | Sep 8, 2021

orrester coined the term zero-trust in 2010 to describe the idea that nothing is inherently safe and that everything must be continuously verified. You may have heard the motto, “Trust nothing; verify everything.” This is a great way to think about zero-trust in Cybersecurity. 

Read More