Network Detection and Response

The Case Against Using a Frankenstein Cybersecurity Platform

The cybersecurity market has, simply put, been cobbled together. A tangled web of non-integrated systems and alerts from siloed systems. Enterprises are now being forced to utilize a “Frankenstein” of stitched together tools to create a platform that might cover their security bases.

The Case Against Using a Frankenstein Cybersecurity Platform Read More →

Improving on the Typical SIEM Model

Despite its inherent flaws, today’s SIEM software solutions still shine when it comes to searching and investigating log data. One effective, comprehensive approach to network security pairs the best parts of SIEM with modern, AI-driven predictive analysis tools. Alternatively, organizations can replace their outdated SIEM with a modern single platform self-learning AI solution.

Improving on the Typical SIEM Model Read More →

The Evolution of SIEM

It should be noted that SIEM platforms are exceptionally effective at what they initially were intended for: providing enterprise teams with a central repository of log information that would allow them to conduct search and investigation activities against machine-generated data. If this was all an enterprise cybersecurity team needed in 2020 to thwart attacks and stop bad actors from infiltrating their systems, SIEM would truly be the cybersecurity silver bullet that it claims to be.

The Evolution of SIEM Read More →

Data Overload Problem: Data Normalization Strategies Are Expensive

Financial institutions spend five to ten million dollars each year managing data. A recent Computer Services Inc (CSI) study reveals that most banks expect to spend up to 40 percent of their budgets on regulatory compliance cybersecurity, often adopting expensive data normalization strategies.

Data Overload Problem: Data Normalization Strategies Are Expensive Read More →

What is Predictive AI and How is it Being Used in Cybersecurity?

The predictive AI field of machine learning collects, analyzes, and tests data to predict future possibilities. AI’s neurological network is patterned on the human brain. But AI works on a scale that goes far beyond what is humanly possible. The top uses for predictive AI technologies to protect sensitive data and systems are in network detection and response (NDR), threat detection, and cybercrime prevention.

What is Predictive AI and How is it Being Used in Cybersecurity? Read More →

Why a Platform With a Generative Baseline Matters

MixMode creates a generative baseline. Unlike the historically-based baselines provided by add-on NTA solutions, a generative baseline is predictive, real-time, and accurate. MixMode provides anomaly detection and behavioral analytics and the ability to suppress false positives and surface true positives.

Why a Platform With a Generative Baseline Matters Read More →

Why The Future of Cybersecurity Needs Both Humans and AI Working Together

A recent WhiteHat Security survey revealed that more than 70 percent of respondents cited AI-based tools as contributing to more efficiency. More than 55 percent of mundane tasks have been replaced by AI, freeing up analysts for other departmental tasks.

Why The Future of Cybersecurity Needs Both Humans and AI Working Together Read More →

NTA and NDR: The Missing Piece

Most SIEM vendors acknowledge the value of network traffic data for leading indicators of attacks, anomaly detection, and user behavior analysis as being far more useful than log data. Ironically, network traffic data is often expressly excluded from SIEM deployments, because the data ingest significantly increases the required data aggregation and storage costs typically 3-5x.

NTA and NDR: The Missing Piece Read More →

Guide: The Next Generation SOC Tool Stack – The Convergence of SIEM, NDR and NTA

Traditional security vendors offering solutions like SIEM (Security Information and Event Management) are overpromising on analytics while also requiring massive spend on basic log storage, incremental analytics, maintenance costs, and supporting resources.

Guide: The Next Generation SOC Tool Stack – The Convergence of SIEM, NDR and NTA Read More →

Whitepaper: Self-Supervised Learning – AI For Complex Network Security

Artificial Intelligence – or AI – has become a buzzword since it emerged in the 1950s. However, all AI systems are not created equal. In our white paper, “Self-Supervised Learning – AI For Complex Network Security,” Dr. Peter Stephenson explains the different “waves” of artificial intelligence. He uses the DARPA definitions for each of these

Whitepaper: Self-Supervised Learning – AI For Complex Network Security Read More →

Encryption = Privacy ≠ Security

For the past few years, many have been talking about the changing “threat landscape” as it pertains to the increase in zero day, insider and phishing threats. While all of these threats are on the rise, and constitute a concern, there is, perhaps, an even larger shift presenting a threat to enterprises – the shift

Encryption = Privacy ≠ Security Read More →

How a Massive Shift to Working From Home Leaves an Enterprise’s Cybersecurity Vulnerable

Many companies are scrambling to find a way to better protect their now-remote team of employees, and as they do so, hackers will take every advantage to find the weaknesses in these spread-out company networks.

How a Massive Shift to Working From Home Leaves an Enterprise’s Cybersecurity Vulnerable Read More →

New Video: Why is network data the best source for actionable data in cybersecurity?

In a recent blog post, our Head of Customer Success, Russell Gray, outlined the reasons why network data is the best source for actionable data in cybersecurity. He covered the limitations of each of the elements of a typical security stack (SIEM, Endpoint, and Firewall) and the importance of network traffic analysis (NTA) in the

New Video: Why is network data the best source for actionable data in cybersecurity? Read More →

A Well-Equipped Security Team Could Save You Millions of Dollars a Year

Data breaches are expensive. By now, most organizations are well aware of this fact. When it comes to resource planning, however, SecOps teams need concrete data to ensure adequate funding is available to handle a breach.

A Well-Equipped Security Team Could Save You Millions of Dollars a Year Read More →

Network Data: The Best Source for Actionable Data in Cybersecurity

With the right tool, your network data can now provide you with most valuable, actionable alerts in your security stack. What follows is a discussion of some of the reasons why you may want to look to your network first when trying to identify potential threats or attacks.

Network Data: The Best Source for Actionable Data in Cybersecurity Read More →

3 Cyberthreats Facing Federal and State Governments in 2020

Bad actors do not discriminate. Organizations across all sectors are at risk — corporations, non-profits, and increasingly, federal and state government entities. The U.S. Government Accountability Office (GAO) reported that security incidents increased by 1,300 percent from 2006 to 2015. This number is growing.

3 Cyberthreats Facing Federal and State Governments in 2020 Read More →

Staying CCPA Compliant with MixMode’s Unsupervised AI

Companies are expected to spend up to $55 billion dollars on efforts to comply with the California Consumer Privacy Act (CCPA), which is still working out its final rules after going into effect this month.

Staying CCPA Compliant with MixMode’s Unsupervised AI Read More →