Mixmode Blog

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

3 Reasons Why Managed Service Providers Should Consider Focusing on Cybersecurity

By Kyle Pullman | Jun 20, 2019

Managed Service Providers (MSPs) today have a tremendous opportunity to help solve the cybersecurity knowledge gap for many small- to mid-market businesses. We’ve all read the “X-number of shortage of cybersecurity professionals by 2020” in the major publications. For example, CNBC’s article, “A serious shortage of cybersecurity experts could cost companies hundreds of millions of …

3 Reasons Why Managed Service Providers Should Consider Focusing on Cybersecurity Read More →

Read More

How Important is AI? This Week in AI

By Ana Mezic | Jun 14, 2019

Is AI Fundamental to the future of Cybersecurity? Artificial Intelligence and Machine Learning are words we hear thrown around a lot, often arbitrarily in the cybersecurity space. However, they are instrumental to the development of our industry. According to this article by Sam Bocetta for CSO,if you turn a blind eye to AI and you will …

How Important is AI? This Week in AI Read More →

Read More

Do we need AI in CYbersecurity? This Week in AI

By Ana Mezic | Jun 7, 2019

Artificial Intelligence is Fundamental to the Future of Cybersecurity According to a 2019 SME Cyber Security Report by Senseon, eighty-one percent of small and medium-sized enterprises (SME) think Artificial Intelligence (AI) is crucial to the state and future of cybersecurity. Key findings in the report include: 88% of SMEs have a dedicated security budget 53% think an …

Do we need AI in CYbersecurity? This Week in AI Read More →

Read More

Operational Technology Risk: Attack Paths, Challenges, and Protection for Vital Industrial Systems

By Russell Gray | Jun 6, 2019

I recently attended NTTSecurity’s webinar, “How to Shine a Light on Operational Technology Risk,” to learn more about current Operational Technology (OT) risks and the security challenges facing different industrial control systems (ICS) and supervisory control and data acquisition systems (SCADA). As a client success and support leader servicing customers in various OT sectors, I recommend …

Operational Technology Risk: Attack Paths, Challenges, and Protection for Vital Industrial Systems Read More →

Read More

Baltimore City Government Ransomware Attack: Municipalities Must Move Beyond Protection at the Perimeter

By Russell Gray | May 22, 2019

Last week The Baltimore Sun reported that Baltimore City Government computers were infected for a second time in just over a year with a certain type of ransomware, RobbinHood, in which hackers lock up files using encryption so users can’t access them. The bad actors then demand payment to provide the cyber keys to unlock the files, …

Baltimore City Government Ransomware Attack: Municipalities Must Move Beyond Protection at the Perimeter Read More →

Read More

SC Magazine: Beefing Up Your Next Generation Security Tool Set

By Christian Wiens | May 20, 2019

Originally published on 5/20/19 on scmagazine.com, this article by Dr. Peter Stephenson is the first in a four-part series to help enterprise and security professionals discover the tools needed to deploy a next-generation enterprise security stack. As it features MixMode as the true AI system needed for your deception network, we wanted to share the article here on our …

SC Magazine: Beefing Up Your Next Generation Security Tool Set Read More →

Read More

5 Ways to Modernize Your MSSP Security Monitoring Program

By Russell Gray | May 14, 2019

MSSPs are helping their customers deal with a fast-paced and ever-evolving threat landscape. It is critical, now more than ever, to evaluate new monitoring tools that produce more actionable data and alerts to help unearth and combat these modern threats more efficiently.    I recently read an article titled  “4 Technologies SMBs Can Use to Modernize …

5 Ways to Modernize Your MSSP Security Monitoring Program Read More →

Read More

Intro to Wire Data: Why Should I Care When I Already Have Log Files?

By Michael-Paul Yelland | May 7, 2019

Most security professionals are well-versed in understanding log files and their importance. Most organizations with a security program operate a SIEM (Security Incident and Event Management) so they can track events around their network. They may use Splunk, FireEye, SolarWinds, QRadar, LogRhythm or many others for a SIEM solution. A SIEM is a very important way to keep track of log …

Intro to Wire Data: Why Should I Care When I Already Have Log Files? Read More →

Read More

How AI is Solving the False Positives Problem in Network Security

By Ana Mezic | Apr 30, 2019

How AI is Solving the False Positives Problem in Network Security By Ana Mezic, Marketing Coordinator at MixMode The term “False Positives” is trending in the cybersecurity industry right now. Rightfully so. Managing the impossible amount of alerts IT teams get from their cybersecurity software is an issue that demands a solution as hackers and gatekeepers play tug-of-war …

How AI is Solving the False Positives Problem in Network Security Read More →

Read More