Network Detection and Response

What is Network Detection and Response (NDR)? A beginner’s Guide

Recently, network detection and response, or NDR, has been established as a key tool for companies seeking to improve their threat response. It’s a relatively new network security strategy which developed in response to perceived shortcomings in existing network security systems. We wanted to help explain what modern network detection and response is, how it

What is Network Detection and Response (NDR)? A beginner’s Guide Read More →

The Endpoint Gap in Corporate Security

“The biggest misconception people have about endpoints is that they have an idea of what their endpoints really are. The security industry has rightly taught defense-in-depth & blocking. However, too many companies rely solely on that concept, and aren’t prepared for what happens when something is breached. That breach, when it happens, will take place

The Endpoint Gap in Corporate Security Read More →

Intro to Wire Data: Why Should I Care When I Already Have Log Files?

Most security professionals are well-versed in understanding log files and their importance. Most organizations with a security program operate a SIEM (Security Incident and Event Management) so they can track events around their network. They may use Splunk, FireEye, SolarWinds, QRadar, LogRhythm or many others for a SIEM solution. A SIEM is a very important way to keep track of log

Intro to Wire Data: Why Should I Care When I Already Have Log Files? Read More →

5 Reasons Why Context-aware Artificial Intelligence (Caai) Is Needed in Cybersecurity

5 reasons why Context-Aware Artificial Intelligence (CAAI) is needed in Cybersecurity CAAI delivers understanding of the network baseline and reducing false positives By Dr. Igor Mezic, CTO and Chief Scientist  Artificial Intelligence (AI) has surfaced as the technology of the day, in the same way internet, personal computers, airplanes and cars have in earlier eras. And, just like these others

5 Reasons Why Context-aware Artificial Intelligence (Caai) Is Needed in Cybersecurity Read More →

Threat Hunting and Endpoints – A Dr. Stephenson tutorial

“Packetsled provides the enrichment that triggers early warnings and proactive action to prevent breaches.” Dr. Stephenson SC Magazine’s Dr. Peter Stephenson analyzes the best threat hunting platforms in cyber security. Read the full blog here About MixMode MixMode is the first to bring a third-wave, context-aware AI approach that automatically learns and adapts to dynamically changing environments.

Threat Hunting and Endpoints – A Dr. Stephenson tutorial Read More →