Mixmode Blog

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Protecting Your Assets: Why Financial Services Firms Need Advanced Threat Detection

By Joe Ariganello | Aug 1, 2023

The financial services industry handles vast amounts of highly sensitive financial information, including customer data, transaction records, and intellectual property, making them a prime target for cyber attacks.

Read More

Detecting the MOVEit Zero-Day: How MixMode AI Stays Ahead of Threats

By Josh Snow | Jul 27, 2023

We discuss a real-life example of a zero-day exploit, focusing on the MOVEit Transfer Software, and how MixMode can detect and mitigate such threats before they become widespread.

Read More

Gartner Security & Risk Management Summit 2023 Recap

By Joe Ariganello | Jul 25, 2023

One of the key predictions is that by 2027, 50% of chief information security officers (CISOs) will adopt human-centric design practices in their cybersecurity programs to minimize operational friction and maximize control adoption. This approach focuses on designing security controls around individuals rather than technology or threats. It recognizes that employees play a crucial role in cybersecurity and aims to reduce the likelihood of risky behavior.

Read More

Understanding and Implementing Biden’s National Cybersecurity Strategy

By Joe Ariganello | Jul 20, 2023

The Biden-Harris Administration has released the National Cybersecurity Strategy Implementation Plan (NCSIP), outlining its commitment to improving cybersecurity in America. The plan focuses on two primary shifts: allocating more responsibility for mitigating cyber risk to capable entities in the public and private sectors and increasing incentives for long-term investments in cybersecurity.

Read More

Forbes Technology Council: Why Large Language Models (LLMs) Alone Won’t Save Cybersecurity

By Matt Shea | Jul 17, 2023

The star of the moment is Large Language Models (aka LLMs), the foundational model that powers ChatGPT. There are plenty of documented examples of truly impressive feats built on this technology: writing reports or outputting code in seconds. At its core, LLMs basically ingest A LOT of text (e.g., think Internet) as a corpus of training data and rely on human feedback in a type of supervised training called reinforcement learning.

Read More

eBook: The Inefficiencies of Legacy Tools – Why SIEMs Alone Are Ineffective At Detecting Advanced Attacks

By Joe Ariganello | Jul 13, 2023

Relying solely on legacy Security Information and Event Management (SIEM) technology is no longer sufficient to protect enterprise organizations from the rising amount of modern, ai-developed, sophisticated cyberattacks. In our newest eBook, we examine the limitations of SIEMs and emphasize the need for an AI-driven dynamic threat detection and response platform.

Read More

Unleashing the Power of Self-Supervised AI: Insights from 451 Research Report on MixMode’s Dynamic Threat Detection and Response

By Christian Wiens | Jul 11, 2023

In an era where cyber threats are becoming increasingly sophisticated, it is crucial for organizations to stay ahead of attacks. By leveraging the power of self-supervised AI, MixMode offers a game-changing solution that can revolutionize threat detection and response capabilities.

Read More

Verizon’s Annual Data Breach Incident Report (DBIR) Shines Spotlight on Ransomware Trends & Insider Threats

By Christian Wiens | Jul 6, 2023

New research from Verizon reveals that ransomware is responsible for a sizable percentage of all recorded security incidents. Despite the alarming statistics raised in the report, the tech giant warns, we’re likely to see continued growth in the number of ransomware attacks against organizations.

Read More

Aligning an Organization’s Attack Surface to Detection Surface is Key to Adversary Defense in Today’s Cloud Era

By Joe Ariganello | Jun 29, 2023

With the Cloud Era, the IT asset estate has expanded, and there is a diverse set of attack surfaces to defend. The term “attack surface” describes the growing IT asset estate, but there is no parallel term to describe where we can detect or respond to attacker activity.

Read More