Blog

Silicon Valley Needs to Step up Their Security: This Week in AI

Silicon Valley Has Let Its Cybersecurity Guard Down According to an article by Brian O’Keefe for Fortune Magazine, Silicon Valley isn’t paying enough attention when it comes to threats posed by state-sponsored hackers. At least, that was the conclusion a group of cybersecurity experts came to in a discussion at the Fortune Brainstorm Tech conference in Aspen, Colo., on …

Silicon Valley Needs to Step up Their Security: This Week in AI Read More →

AI-Enabled Cybersecurity Is Necessary for Defense: Capgemini Report

850 senior executives from Information Security, Cybersecurity, and IT Operations in seven industries across ten countries were recently surveyed by consulting and technology services firm, Capgemini, in their “Reinventing Cybersecurity with Artificial Intelligence” report. The goal being to understand today’s benefits, complexities, and levels of implementation of AI in cybersecurity across IT (information technology), OT (operation …

AI-Enabled Cybersecurity Is Necessary for Defense: Capgemini Report Read More →

Artificial Intelligence Gaining Popularity Overseas: This Week In AI

AI is Picking Up Speed Overseas An online study found that over a quarter of respondents in Europe, the Middle East, and Asia would prefer their cybersecurity to be managed by AI.  The study interviewed more than 10,000 people in EMEAi and was conducted by Palo Alto Networks and YouGov alongside Dr Jessica Barker, an expert in the human nature of …

Artificial Intelligence Gaining Popularity Overseas: This Week In AI Read More →

Web App Security: Necessary, Vulnerable, and In Need of AI for Security

Web applications are a necessary part of doing business in 2019. Walk into any department in any company — large or small — and employees likely have several web app browsers on their screen that are making their job function easier. We are talking the sites that modern day businesses depend on: Google Cloud, Slack, WordPress, DropBox, PayPal, Shopify, Salesforce…and the list goes …

Web App Security: Necessary, Vulnerable, and In Need of AI for Security Read More →

The Endpoint Gap in Corporate Security

“The biggest misconception people have about endpoints is that they have an idea of what their endpoints really are. The security industry has rightly taught defense-in-depth & blocking. However, too many companies rely solely on that concept, and aren’t prepared for what happens when something is breached. That breach, when it happens, will take place …

The Endpoint Gap in Corporate Security Read More →

Machine Learning vs Artificial Intelligence: This Week in AI

What’s the difference between ML and AI in Cybersecurity? Many don’t understand how AI works in terms of cybersecurity, despite most agreeing that it is necessary to implement it going forward. According to a recent survey by Webroot, nearly 75 percent of IT professionals stated they intend to incorporate more artificial intelligence (AI) solutions into their cybersecurity …

Machine Learning vs Artificial Intelligence: This Week in AI Read More →

3 Reasons Why Managed Service Providers Should Consider Focusing on Cybersecurity

Managed Service Providers (MSPs) today have a tremendous opportunity to help solve the cybersecurity knowledge gap for many small- to mid-market businesses. We’ve all read the “X-number of shortage of cybersecurity professionals by 2020” in the major publications. For example, CNBC’s article, “A serious shortage of cybersecurity experts could cost companies hundreds of millions of …

3 Reasons Why Managed Service Providers Should Consider Focusing on Cybersecurity Read More →

Do we need AI in CYbersecurity? This Week in AI

Artificial Intelligence is Fundamental to the Future of Cybersecurity According to a 2019 SME Cyber Security Report by Senseon, eighty-one percent of small and medium-sized enterprises (SME) think Artificial Intelligence (AI) is crucial to the state and future of cybersecurity. Key findings in the report include: 88% of SMEs have a dedicated security budget 53% think an …

Do we need AI in CYbersecurity? This Week in AI Read More →

Operational Technology Risk: Attack Paths, Challenges, and Protection for Vital Industrial Systems

I recently attended NTTSecurity’s webinar, “How to Shine a Light on Operational Technology Risk,” to learn more about current Operational Technology (OT) risks and the security challenges facing different industrial control systems (ICS) and supervisory control and data acquisition systems (SCADA). As a client success and support leader servicing customers in various OT sectors, I recommend …

Operational Technology Risk: Attack Paths, Challenges, and Protection for Vital Industrial Systems Read More →

Baltimore City Government Ransomware Attack: Municipalities Must Move Beyond Protection at the Perimeter

Last week The Baltimore Sun reported that Baltimore City Government computers were infected for a second time in just over a year with a certain type of ransomware, RobbinHood, in which hackers lock up files using encryption so users can’t access them. The bad actors then demand payment to provide the cyber keys to unlock the files, …

Baltimore City Government Ransomware Attack: Municipalities Must Move Beyond Protection at the Perimeter Read More →

SC Magazine: Beefing Up Your Next Generation Security Tool Set

Originally published on 5/20/19 on scmagazine.com, this article by Dr. Peter Stephenson is the first in a four-part series to help enterprise and security professionals discover the tools needed to deploy a next-generation enterprise security stack. As it features MixMode as the true AI system needed for your deception network, we wanted to share the article here on our …

SC Magazine: Beefing Up Your Next Generation Security Tool Set Read More →

5 Ways to Modernize Your MSSP Security Monitoring Program

MSSPs are helping their customers deal with a fast-paced and ever-evolving threat landscape. It is critical, now more than ever, to evaluate new monitoring tools that produce more actionable data and alerts to help unearth and combat these modern threats more efficiently.    I recently read an article titled  “4 Technologies SMBs Can Use to Modernize …

5 Ways to Modernize Your MSSP Security Monitoring Program Read More →

Intro to Wire Data: Why Should I Care When I Already Have Log Files?

Most security professionals are well-versed in understanding log files and their importance. Most organizations with a security program operate a SIEM (Security Incident and Event Management) so they can track events around their network. They may use Splunk, FireEye, SolarWinds, QRadar, LogRhythm or many others for a SIEM solution. A SIEM is a very important way to keep track of log …

Intro to Wire Data: Why Should I Care When I Already Have Log Files? Read More →

How AI is Solving the False Positives Problem in Network Security

How AI is Solving the False Positives Problem in Network Security By Ana Mezic, Marketing Coordinator at MixMode The term “False Positives” is trending in the cybersecurity industry right now. Rightfully so. Managing the impossible amount of alerts IT teams get from their cybersecurity software is an issue that demands a solution as hackers and gatekeepers play tug-of-war …

How AI is Solving the False Positives Problem in Network Security Read More →

5 Reasons Why Context-aware Artificial Intelligence (Caai) Is Needed in Cybersecurity

5 reasons why Context-Aware Artificial Intelligence (CAAI) is needed in Cybersecurity CAAI delivers understanding of the network baseline and reducing false positives By Dr. Igor Mezic, CTO and Chief Scientist  Artificial Intelligence (AI) has surfaced as the technology of the day, in the same way internet, personal computers, airplanes and cars have in earlier eras. And, just like these others …

5 Reasons Why Context-aware Artificial Intelligence (Caai) Is Needed in Cybersecurity Read More →

The Intersection of IoT and OT with Security

The Intersection of IoT and OT with Security By Aaron Eppert Sr. Director of Engineering at PacketSled The Internet of Things (IoT) receives all of the headlines now for how this ever-expanding array of disjoint new devices open a security vulnerability around every possible corner. However, there exists a more silent, but globally more important array of technology …

The Intersection of IoT and OT with Security Read More →

Threat Hunting and Endpoints – A Dr. Stephenson tutorial

“Packetsled provides the enrichment that triggers early warnings and proactive action to prevent breaches.” Dr. Stephenson SC Magazine’s Dr. Peter Stephenson analyzes the best threat hunting platforms in cyber security. Read the full blog here About MixMode MixMode is the first to bring a third-wave, context-aware AI approach that automatically learns and adapts to dynamically changing environments. …

Threat Hunting and Endpoints – A Dr. Stephenson tutorial Read More →