Christian Wiens

Christian Wiens is Director of Marketing at MixMode. He has 10+ years of experience as a cybersecurity professional. He has his BA from The University of California, Berkeley and resides in Austin, TX.

Video: Modernizing Phoenix’s Cybersecurity to Combat Nation-State Attacks

Shannon Lawson, CISO for the City of Phoenix, and Geoffrey Coulehan, Head of Sales for MixMode recently joined forces for a fireside chat at the Evanta CISO Summit in Phoenix, AZ. Lawson and Coulehan have been partnering together for almost three years to transform the City’s cybersecurity initiatives and Security Operations Center (SOC). 

Video: Modernizing Phoenix’s Cybersecurity to Combat Nation-State Attacks Read More →

Financial Services IT Teams Relying on Legacy Cybersecurity Plagued By False Positives and Negatives

Cybersecurity teams working in financial and banking settings face a constant struggle — protecting industry regulated data with limited resources. The situation can reach a breaking point when these teams become overwhelmed managing false positive and negative flags triggered by legacy cybersecurity solutions.

Financial Services IT Teams Relying on Legacy Cybersecurity Plagued By False Positives and Negatives Read More →

Killware: How to Protect Your City From This Growing Next-Generation Cybersecurity Threat

The term killware is an overarching term that covers a wide variety of cyberattack types that target the real-life health of victims. While other forms of malware are usually defined by their method — think DDoS or spear phishing attacks — killware is defined by its end result, and can include any number of methods, including malware and ransomware.

Killware: How to Protect Your City From This Growing Next-Generation Cybersecurity Threat Read More →

Webinar On Demand: Stopping Novel Attacks – Secure Your Business Against Unknown Threats

Hosted by Mark Ehr, Senior Consulting Analyst for 451 Research Advisors and Igor Mezic, Chief Scientist and CTO for MixMode on Tuesday, November 1st at 1pm EST / 10am PST, they will discuss why security analytics needs to include advanced Third-Wave AI, which autonomously learns normal behavior and adapts to constantly changing network environments, to address the next generation of cyberthreats and increase SOC productivity.

Webinar On Demand: Stopping Novel Attacks – Secure Your Business Against Unknown Threats Read More →

U.S. Cities Relying on Legacy Cybersecurity Plagued By False Positives and Negatives

Cybersecurity teams working in municipal settings face a constant struggle — protecting vital public network infrastructure with limited resources. The situation can reach a breaking point when these teams become overwhelmed managing false positive and negative flags triggered by legacy cybersecurity solutions.

U.S. Cities Relying on Legacy Cybersecurity Plagued By False Positives and Negatives Read More →

451 Research Finds Self-Learning Technology to Address Cybersecurity Blind Spots and Reduce Analyst Burnout

In the report, 451 Research explains why security analytics needs to include advanced Third-Wave AI, which autonomously learns normal behavior and adapts to constantly changing network environments, to address the next generation of cyberthreats and increase SOC productivity.

451 Research Finds Self-Learning Technology to Address Cybersecurity Blind Spots and Reduce Analyst Burnout Read More →

Cybersecurity Awareness Month Focuses on the “People” Part of Cybersecurity

October is recognized every year as Cyber Security Awareness Month (CSAM). Starting in 2004, this important awareness month has been a collaboration between The Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) to lead a collaborative effort between government and industry to raise cybersecurity awareness nationally and internationally.

Cybersecurity Awareness Month Focuses on the “People” Part of Cybersecurity Read More →

Case Study: How a Major U.S. City Rapidly Modernized Its Cybersecurity Defenses

In our newest case study, “How a Major U.S. City Rapidly Modernized Its Cybersecurity Defenses,” we share how the City cut its cyber tool footprint in half, gained visibility into advanced foreign adversary attacks, and greatly improved the productivity of its SOC staff.

Case Study: How a Major U.S. City Rapidly Modernized Its Cybersecurity Defenses Read More →

Updated for 2022: What is Network Traffic Analysis? A Beginner’s Guide

87 percent of organizations use network traffic analysis (NTA) tools for threat detection and response according to ESG, an IT strategy firm. In their 2020 study, 43 percent of organizations surveyed said NTA is a “first line of defense” for detecting and responding to threats.

Updated for 2022: What is Network Traffic Analysis? A Beginner’s Guide Read More →

Can Your Cyber Tools Monitor Any Stream of Data?

It’s the open secret no one’s talking about — too many cybersecurity solutions in the marketplace stand no chance of providing comprehensive coverage because they are incapable of handling data arising from all sources. Many available solutions are effectively legacy platforms hiding within fresh marketing packages.

Can Your Cyber Tools Monitor Any Stream of Data? Read More →

The Fallacy of “One-Click Remediation”

Let’s take a closer look at the false narrative being propagated in the cybersecurity market and explore some more appropriate alternatives. An example of a legacy cyber tool vendor “feature” being touted as an ideal solution to the problem of automatic remediation is reliant on a standard (though rarely used for reasons we will explore in this article) function known as TCP Reset.

The Fallacy of “One-Click Remediation” Read More →

Updated for 2022: What is Network Detection and Response (NDR)? A Beginner’s Guide

Network detection and response, or NDR, has been established as a key tool for companies seeking to improve their threat response. It has become a network security strategy which developed in response to perceived shortcomings in existing network security systems.

Updated for 2022: What is Network Detection and Response (NDR)? A Beginner’s Guide Read More →

Customer Case Study: Self-Learning Cyber Defense for Financial Institutions

The nation’s largest Financial Services providers are a favorite target for nation-state sponsored and coordinated cyber-attacks. Despite significantly more financial and resource investment in cybersecurity than any other industry, critical infrastructure breaches and novel attacks remain a daily occurrence.

Customer Case Study: Self-Learning Cyber Defense for Financial Institutions Read More →