Mixmode Blog

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

The Aggregation Model is Falling Short

By Christian Wiens | Apr 22, 2021

The following is an excerpt from our recent whitepaper, “Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks,” in which we dive into how traditional cybersecurity tools work, why this fundamentally limits them from being able to detect zero-day or previously unknown attacks, why the industry standard for breach detection is around […]

Read More

Log Data is Not Effective as a Foundation for Prevention, Detection, Remediation or Analytics

By Geoffrey Coulehan | Apr 20, 2021

In the imperfect, real world, where SOC teams actually live, the SIEM log-based approach is fundamentally flawed. In fact, it tends to add more challenge to the workday for SOC teams, not less.

Read More

Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks

By Christian Wiens | Apr 15, 2021

In our newest whitepaper, “Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks,” we dive into how traditional cybersecurity tools work, why this fundamentally limits them from being able to detect zero-day or previously unknown attacks, why the industry standard for breach detection is around six to eight months and how modern, contextually-aware AI overcomes the limitations of traditional cybersecurity solutions.

Read More

Incremental Stacking of Correlative Analysis Platforms Will Ultimately Prove Ineffective and Costly

By Geoffrey Coulehan | Apr 8, 2021

On the surface, an “incremental stacking” approach to correlative analysis platforms like SIEM, XDR and UEBA is logical. Organizations can overcome some of the inherent limitations present in their security solutions by adding a network traffic analysis (NTA), for example. Industry analysts have been touting this approach for some time now as necessary for full coverage enterprise security.

Read More

A Modern SOC Should Not Be Entirely Dependent On Human Operators and Their Personal Experience

By Geoffrey Coulehan | Apr 6, 2021

A modern SOC should not be entirely dependent on human operators and their personal experience. The issue has been a foundational problem with not only the methodologies used by SOCs for the past 15 to 20 years, but it should be questioned whether the problem is actually compounded by the technology itself.

Read More

Maximize ROI with Greater Efficacy Using Unsupervised AI

By Christian Wiens | Mar 18, 2021

Within the first 24 hours after deployment, MixMode had enabled the government entity to regain control over the security environment and network data infrastructure. No longer limited to log data analysis, they were able to identify and address real-time threats as well as network and operational configuration challenges.

Read More

How Self-Supervised AI Tackles Ambiguity in Network Security

By Geoffrey Coulehan | Mar 16, 2021

Cybersecurity vendors promise the moon when it comes to AI. As the recent TechRepublic article, “Why cybersecurity tools fail when it comes to ambiguity,” makes clear, often, these promises fail short in real world network environments.

Read More

Performing Critical Cyber Diligence for Mergers and Acquisitions Using MixMode

By Christian Wiens | Mar 11, 2021

According to a recent M&A trends survey conducted by Deloitte, 51 percent of 1,000 Executives responsible for Mergers and Acquisitions (M&A) at U.S. companies and private-equity investor firms listed cybersecurity threats as their top concern in executing deals virtually.

Read More

The Hidden Costs and Challenges of Log Data Storage Using a SIEM

By Christian Wiens | Feb 24, 2021

Ultimately, MixMode found, the log-based SIEM approach resulted in five times the amount of data that needed to be stored, a cost that was passed along to the government entity.

Read More