Mixmode Blog
Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Ransomware: The $20 Billion Cybersecurity Problem
Over the past few years, ransomware attacks have become more sophisticated, morphing from spray-and-pray phishing blasts to highly targeted and extremely damaging network-wide infections that can cause days or weeks of downtime for a whole organization.
Read MoreThe Top 5 Zero-Day Attacks of the 21st Century
Zero-Day attacks in Cybersecurity have become weapons of choice at the hands of bad actors over the past several years. But what does this term mean and how has this tactic evolved to become such a prevalent threat?
Read MoreIn Case You Missed It: 2 Cyber Expert Webinars Now Available On-Demand
Over the past couple of months MixMode has teamed up with leading cybersecurity experts for a pair of enterprise-focused webinars to discuss the challenges for both legacy and emerging cybersecurity solutions.
Read MoreWhat is Anomaly Detection in Cybersecurity?
Anomaly detection, the “identification of rare occurrences, items, or events of concern due to their differing characteristics from the majority of the processed data,” allows organizations to track “security errors, structural defects and even bank fraud,” according to DeepAI and described in three main forms of anomaly detection as: unsupervised, supervised and semi-supervised. Security Operations Center (SOC) analysts use each of these approaches to varying degrees of effectiveness in Cybersecurity applications.
Read MoreWebinar Recap: Tool Sprawl – The Trillion Dollar Problem in Cybersecurity
The panelists shared that for CISOs sitting in the cyber leadership position, when new systems, platforms, and services are being procured, are they being procured while looking at the whole picture? Or is it a one-off purchase for a single problem or squeaky wheel like, for example, identity management or SIEM?
Read MoreGaps in the Next-Generation SOC
As SIEM evolved, vendors began bolting on NDR (network detection and response) and NTA (network traffic analysis) to their base SIEM offerings. The hope (and promise) was that these tools would add the real-time security solution that was lacking with SIEM technology.
Read MoreData Overload Impacts Security Outcomes
espite the availability of new technology, companies still have to depend on extracted, aggregated, and normalized historical data to operate. The inherent architecture of legacy solutions diverts focus away from fundamental business problems companies need to address.
Read MoreWebinar: Tool Sprawl – The Trillion Dollar Problem in Cybersecurity
Join us for our upcoming webinar on Thursday, July 8th at 11:00 AM (PDT), “Tool Sprawl: The Trillion Dollar Problem in Cybersecurity.” It will be hosted by former CISO of CBRE and Current CEO of 5Q, Don Goldstein, and Matt Shea, MixMode’s Head of Federal. They will discuss and review the trillion dollar problem of tool sprawl, how it was created by vendors and industry analysts intent on selling goods and services that ultimately are failing to defend organizations, and how a new way of looking at cybersecurity can help us overcome it.
Read MoreModern Security Issues Require Modern Solutions
A jumble of ineffective, incomplete, extremely expensive platforms that don’t meet the fundamental challenges faced by enterprise SOC teams in the early 2020s is not sustainable.
Read More