SOC

451 Research Finds Self-Learning Technology to Address Cybersecurity Blind Spots and Reduce Analyst Burnout

In the report, 451 Research explains why security analytics needs to include advanced Third-Wave AI, which autonomously learns normal behavior and adapts to constantly changing network environments, to address the next generation of cyberthreats and increase SOC productivity.

Cybersecurity Awareness Month Focuses on the “People” Part of Cybersecurity

October is recognized every year as Cyber Security Awareness Month (CSAM). Starting in 2004, this important awareness month has been a collaboration between The Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) to lead a collaborative effort between government and industry to raise cybersecurity awareness nationally and internationally.

Webinar: Tool Sprawl – The Trillion Dollar Problem in Cybersecurity

Join us for our upcoming webinar on Thursday, July 8th at 11:00 AM (PDT), “Tool Sprawl: The Trillion Dollar Problem in Cybersecurity.” It will be hosted by former CISO of CBRE and Current CEO of 5Q, Don Goldstein, and Matt Shea, MixMode’s Head of Federal. They will discuss and review the trillion dollar problem of tool sprawl, how it was created by vendors and industry analysts intent on selling goods and services that ultimately are failing to defend organizations, and how a new way of looking at cybersecurity can help us overcome it.

Webinar Recap: Why Your Legacy Cyber Platforms Can’t Defend Against Modern Day Attacks

In partnership with Ravenii, our 60-minute talk was hosted by MixMode’s Head of Sales and Alliances, Geoff Coulehan, CEO of Ravenii, Jeff Shipley, and MixMode’s CTO & Chief Scientist, Igor Mezic. They discussed key topics including:

New Video: MixMode Cyber Anomaly Detection Platform

We recently released a new video to better explain how MixMode’s next-generation cybersecurity anomaly detection platform combines the functionality of SIEM, NDR, NTA and UEBA for advanced threat detection, zero day attack identification, false positive alert reduction, forensic investigation and more.

The Top 5 Considerations That Should Guide Your SOC Strategy in 2021 and Beyond

It’s evident that while organizations are spending more and more on legacy cybersecurity solutions, these platforms are not holding up their end of the deal and are not able to proactively defend in a modern, non-signature attack threatscape.

The Aggregation Model is Falling Short

The following is an excerpt from our recent whitepaper, “Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks,” in which we dive into how traditional cybersecurity tools work, why this fundamentally limits them from being able to detect zero-day or previously unknown attacks, why the industry standard for breach detection is around …

The Aggregation Model is Falling Short Read More →

Incremental Stacking of Correlative Analysis Platforms Will Ultimately Prove Ineffective and Costly

On the surface, an “incremental stacking” approach to correlative analysis platforms like SIEM, XDR and UEBA is logical. Organizations can overcome some of the inherent limitations present in their security solutions by adding a network traffic analysis (NTA), for example. Industry analysts have been touting this approach for some time now as necessary for full coverage enterprise security.

A Modern SOC Should Not Be Entirely Dependent On Human Operators and Their Personal Experience

A modern SOC should not be entirely dependent on human operators and their personal experience. The issue has been a foundational problem with not only the methodologies used by SOCs for the past 15 to 20 years, but it should be questioned whether the problem is actually compounded by the technology itself.

The SOC Reckoning

What are companies really gaining when they take on SOAR? At a high level, SOAR and legacy platforms are falling far short of their promises. SOCs are left with several pivotal questions.