Blog

The History and Current State of Ransomware Attacks

Ransomware uses a variety of attack techniques, including phishing where it can be very difficult for a human to discern whether an email is safe or not. These attacks usually impact the operations of a company immediately, and the recent rise in Ransomware attacks coincides closely with the rise of cryptocurrency as hackers are able to demand payment in untraceable forms like Bitcoin.

What is Zero-Trust in Cybersecurity?

orrester coined the term zero-trust in 2010 to describe the idea that nothing is inherently safe and that everything must be continuously verified. You may have heard the motto, “Trust nothing; verify everything.” This is a great way to think about zero-trust in Cybersecurity. 

MixMode Featured In Latest Gartner Report on Emerging Trends in Network Detection and Response

MixMode announced today their inclusion in the 2021 Gartner report, ‘Emerging Trends: Top Use Cases for Network Detection and Response.’ The report, available only to Gartner users, provides in depth analysis on the top four use cases driving the NDR market including detection, hunting, forensics and response, as well as NDR development recommendations for product leaders.

What is Anomaly Detection in Cybersecurity?

Anomaly detection, the “identification of rare occurrences, items, or events of concern due to their differing characteristics from the majority of the processed data,” allows organizations to track “security errors, structural defects and even bank fraud,” according to DeepAI and described in three main forms of anomaly detection as: unsupervised, supervised and semi-supervised. Security Operations Center (SOC) analysts use each of these approaches to varying degrees of effectiveness in Cybersecurity applications.