Christian Wiens

Data Overload Problem: Data Normalization Strategies Are Expensive

Financial institutions spend five to ten million dollars each year managing data. A recent Computer Services Inc (CSI) study reveals that most banks expect to spend up to 40 percent of their budgets on regulatory compliance cybersecurity, often adopting expensive data normalization strategies.

Why a Platform With a Generative Baseline Matters

MixMode creates a generative baseline. Unlike the historically-based baselines provided by add-on NTA solutions, a generative baseline is predictive, real-time, and accurate. MixMode provides anomaly detection and behavioral analytics and the ability to suppress false positives and surface true positives.

NTA and NDR: The Missing Piece

Most SIEM vendors acknowledge the value of network traffic data for leading indicators of attacks, anomaly detection, and user behavior analysis as being far more useful than log data. Ironically, network traffic data is often expressly excluded from SIEM deployments, because the data ingest significantly increases the required data aggregation and storage costs typically 3-5x.

Why Training Matters – And How Adversarial AI Takes Advantage of It

The following is an excerpt from our recently published whitepaper, “Self-Supervised Learning – AI for Complex Network Security.” The author, Dr. Peter Stephenson, is a cybersecurity and digital forensics expert having practiced in the security, forensics and digital investigation fields for over 55 years.  Section 4 – Why Training Matters – And How The Adversary …

Why Training Matters – And How Adversarial AI Takes Advantage of It Read More →

Whitepaper: Self-Supervised Learning – AI For Complex Network Security

Artificial Intelligence – or AI – has become a buzzword since it emerged in the 1950s. However, all AI systems are not created equal. In our white paper, “Self-Supervised Learning – AI For Complex Network Security,” Dr. Peter Stephenson explains the different “waves” of artificial intelligence. He uses the DARPA definitions for each of these …

Whitepaper: Self-Supervised Learning – AI For Complex Network Security Read More →

How the Role of the Modern Security Analyst is Changing

As organizations began to rely more heavily on networking to carry out their operations over the past decade, IT teams added security analyst positions. These professionals focused on network security and providing regulatory compliance oversight.  Over time, the role of the security analyst has expanded to include threat hunting tasks. That is, evaluating security platform …

How the Role of the Modern Security Analyst is Changing Read More →