Blog

Intro to Wire Data: Why Should I Care When I Already Have Log Files?

Most security professionals are well-versed in understanding log files and their importance. Most organizations with a security program operate a SIEM (Security Incident and Event Management) so they can track events around their network. They may use Splunk, FireEye, SolarWinds, QRadar, LogRhythm or many others for a SIEM solution. A SIEM is a very important way to keep track of log …

Intro to Wire Data: Why Should I Care When I Already Have Log Files? Read More →

How AI is Solving the False Positives Problem in Network Security

How AI is Solving the False Positives Problem in Network Security By Ana Mezic, Marketing Coordinator at MixMode The term “False Positives” is trending in the cybersecurity industry right now. Rightfully so. Managing the impossible amount of alerts IT teams get from their cybersecurity software is an issue that demands a solution as hackers and gatekeepers play tug-of-war …

How AI is Solving the False Positives Problem in Network Security Read More →

5 Reasons Why Context-aware Artificial Intelligence (Caai) Is Needed in Cybersecurity

5 reasons why Context-Aware Artificial Intelligence (CAAI) is needed in Cybersecurity CAAI delivers understanding of the network baseline and reducing false positives By Dr. Igor Mezic, CTO and Chief Scientist  Artificial Intelligence (AI) has surfaced as the technology of the day, in the same way internet, personal computers, airplanes and cars have in earlier eras. And, just like these others …

5 Reasons Why Context-aware Artificial Intelligence (Caai) Is Needed in Cybersecurity Read More →

The Intersection of IoT and OT with Security

The Intersection of IoT and OT with Security By Aaron Eppert Sr. Director of Engineering at PacketSled The Internet of Things (IoT) receives all of the headlines now for how this ever-expanding array of disjoint new devices open a security vulnerability around every possible corner. However, there exists a more silent, but globally more important array of technology …

The Intersection of IoT and OT with Security Read More →

Threat Hunting and Endpoints – A Dr. Stephenson tutorial

“Packetsled provides the enrichment that triggers early warnings and proactive action to prevent breaches.” Dr. Stephenson SC Magazine’s Dr. Peter Stephenson analyzes the best threat hunting platforms in cyber security. Read the full blog here About MixMode MixMode is the first to bring a third-wave, context-aware AI approach that automatically learns and adapts to dynamically changing environments. …

Threat Hunting and Endpoints – A Dr. Stephenson tutorial Read More →