Mixmode Blog

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

3 Articles You May Have Missed Last Month

By Ana Mezic | Jul 1, 2019

Wow. Did June go by as fast for you as it did for us? Closing out Q2 and heading into a short Holiday week (Happy 4th of July everyone), we wanted to share 3 of our top articles from last month that are definitely worth a quick read – whether it be from your office […]

Read More

Hackers are Starting to Use AI: This Week In AI

By Ana Mezic | Jun 28, 2019

Here’s Why It’s Time To Prepare for AI Wielding Hackers  “The war against cyber attackers isn’t a fair battle. Companies have to defend against all attacks, while the attackers only have to get through once. And it’s about to get much, much worse,” writes Marie Korolov for Data Center Knowledge, effectively explaining the biggest roadblock for […]

Read More

The Endpoint Gap in Corporate Security

By Kyle Pullman | Jun 26, 2019

“The biggest misconception people have about endpoints is that they have an idea of what their endpoints really are. The security industry has rightly taught defense-in-depth & blocking. However, too many companies rely solely on that concept, and aren’t prepared for what happens when something is breached. That breach, when it happens, will take place […]

Read More

Machine Learning vs Artificial Intelligence: This Week in AI

By Ana Mezic | Jun 21, 2019

What’s the difference between ML and AI in Cybersecurity? Many don’t understand how AI works in terms of cybersecurity, despite most agreeing that it is necessary to implement it going forward. According to a recent survey by Webroot, nearly 75 percent of IT professionals stated they intend to incorporate more artificial intelligence (AI) solutions into their cybersecurity […]

Read More

3 Reasons Why Managed Service Providers Should Consider Focusing on Cybersecurity

By Kyle Pullman | Jun 20, 2019

Managed Service Providers (MSPs) today have a tremendous opportunity to help solve the cybersecurity knowledge gap for many small- to mid-market businesses. We’ve all read the “X-number of shortage of cybersecurity professionals by 2020” in the major publications. For example, CNBC’s article, “A serious shortage of cybersecurity experts could cost companies hundreds of millions of […]

Read More

How Important is AI? This Week in AI

By Ana Mezic | Jun 14, 2019

Is AI Fundamental to the future of Cybersecurity? Artificial Intelligence and Machine Learning are words we hear thrown around a lot, often arbitrarily in the cybersecurity space. However, they are instrumental to the development of our industry. According to this article by Sam Bocetta for CSO,if you turn a blind eye to AI and you will […]

Read More

Do we need AI in CYbersecurity? This Week in AI

By Ana Mezic | Jun 7, 2019

Artificial Intelligence is Fundamental to the Future of Cybersecurity According to a 2019 SME Cyber Security Report by Senseon, eighty-one percent of small and medium-sized enterprises (SME) think Artificial Intelligence (AI) is crucial to the state and future of cybersecurity. Key findings in the report include: 88% of SMEs have a dedicated security budget 53% think an […]

Read More

Operational Technology Risk: Attack Paths, Challenges, and Protection for Vital Industrial Systems

By Russell Gray | Jun 6, 2019

I recently attended NTTSecurity’s webinar, “How to Shine a Light on Operational Technology Risk,” to learn more about current Operational Technology (OT) risks and the security challenges facing different industrial control systems (ICS) and supervisory control and data acquisition systems (SCADA). As a client success and support leader servicing customers in various OT sectors, I recommend […]

Read More

Baltimore City Government Ransomware Attack: Municipalities Must Move Beyond Protection at the Perimeter

By Russell Gray | May 22, 2019

Last week The Baltimore Sun reported that Baltimore City Government computers were infected for a second time in just over a year with a certain type of ransomware, RobbinHood, in which hackers lock up files using encryption so users can’t access them. The bad actors then demand payment to provide the cyber keys to unlock the files, […]

Read More