Threat Detection

Why The Future of Cybersecurity Needs Both Humans and AI Working Together

A recent WhiteHat Security survey revealed that more than 70 percent of respondents cited AI-based tools as contributing to more efficiency. More than 55 percent of mundane tasks have been replaced by AI, freeing up analysts for other departmental tasks.

Why The Future of Cybersecurity Needs Both Humans and AI Working Together Read More →

Encryption = Privacy ≠ Security

For the past few years, many have been talking about the changing “threat landscape” as it pertains to the increase in zero day, insider and phishing threats. While all of these threats are on the rise, and constitute a concern, there is, perhaps, an even larger shift presenting a threat to enterprises – the shift

Encryption = Privacy ≠ Security Read More →

How the Role of the Modern Security Analyst is Changing

As organizations began to rely more heavily on networking to carry out their operations over the past decade, IT teams added security analyst positions. These professionals focused on network security and providing regulatory compliance oversight.  Over time, the role of the security analyst has expanded to include threat hunting tasks. That is, evaluating security platform

How the Role of the Modern Security Analyst is Changing Read More →

New Whitepaper: How Predictive AI is Disrupting the Cybersecurity Industry

Our newest whitepaper, “How Predictive AI is Disrupting the Cybersecurity Industry,” evaluates several common SecOps issues around Network Traffic Analysis, explaining why typical solutions are wholly ineffective and represent sunk costs versus added value. We examine how self-supervised learning AI is poised to overcome the SecOps challenges of protecting today’s distributed networks.

New Whitepaper: How Predictive AI is Disrupting the Cybersecurity Industry Read More →

The Many Ways Your Employees Can Get Hacked While Working From Home and How to Respond

Although it is not surprising at all that hackers are taking advantage of the global pandemic —phishing threat reports are always highest when there is some natural disaster happening— we have never before had such an unsafe environment to protect. Here are a few of the most popular malicious acts:

The Many Ways Your Employees Can Get Hacked While Working From Home and How to Respond Read More →

What the Clearview AI Breach Tells Us About Cybersecurity Today

The 2020 Clearview AI data breach spawned hundreds of attention-grabbing headlines, and for good reason. The company works closely with law enforcement agencies and other entities by sharing personal information about millions of people, for a variety of purposes. The breach raised many questions about the vulnerability of personal data in general.

What the Clearview AI Breach Tells Us About Cybersecurity Today Read More →

How a Massive Shift to Working From Home Leaves an Enterprise’s Cybersecurity Vulnerable

Many companies are scrambling to find a way to better protect their now-remote team of employees, and as they do so, hackers will take every advantage to find the weaknesses in these spread-out company networks.

How a Massive Shift to Working From Home Leaves an Enterprise’s Cybersecurity Vulnerable Read More →

New Video: How does MixMode’s context-aware AI build a network baseline?

MixMode’s leadership team came together to share more on how our context-aware AI builds network baselines for organizations across the globe, it’s predictive capabilities, and how MixMode helps you more intelligently discover anomalies within your network environment.

New Video: How does MixMode’s context-aware AI build a network baseline? Read More →

New Video: Why is network data the best source for actionable data in cybersecurity?

In a recent blog post, our Head of Customer Success, Russell Gray, outlined the reasons why network data is the best source for actionable data in cybersecurity. He covered the limitations of each of the elements of a typical security stack (SIEM, Endpoint, and Firewall) and the importance of network traffic analysis (NTA) in the

New Video: Why is network data the best source for actionable data in cybersecurity? Read More →

A Well-Equipped Security Team Could Save You Millions of Dollars a Year

Data breaches are expensive. By now, most organizations are well aware of this fact. When it comes to resource planning, however, SecOps teams need concrete data to ensure adequate funding is available to handle a breach.

A Well-Equipped Security Team Could Save You Millions of Dollars a Year Read More →

Network Data: The Best Source for Actionable Data in Cybersecurity

With the right tool, your network data can now provide you with most valuable, actionable alerts in your security stack. What follows is a discussion of some of the reasons why you may want to look to your network first when trying to identify potential threats or attacks.

Network Data: The Best Source for Actionable Data in Cybersecurity Read More →

3 Cyberthreats Facing Federal and State Governments in 2020

Bad actors do not discriminate. Organizations across all sectors are at risk — corporations, non-profits, and increasingly, federal and state government entities. The U.S. Government Accountability Office (GAO) reported that security incidents increased by 1,300 percent from 2006 to 2015. This number is growing.

3 Cyberthreats Facing Federal and State Governments in 2020 Read More →

Staying CCPA Compliant with MixMode’s Unsupervised AI

Companies are expected to spend up to $55 billion dollars on efforts to comply with the California Consumer Privacy Act (CCPA), which is still working out its final rules after going into effect this month.

Staying CCPA Compliant with MixMode’s Unsupervised AI Read More →

Yesterday’s SIEM Solutions Can’t Combat Today’s Cyberthreats

While it’s true that having a SIEM is better than forgoing network monitoring all together, a standalone SIEM solution is simply insufficient in today’s cybersecurity landscape. Hackers and other bad actors have become more sophisticated — many of today’s cybercriminals can easily outsmart a standard SIEM setup.

Yesterday’s SIEM Solutions Can’t Combat Today’s Cyberthreats Read More →

Hacks and Breaches of 2019: A Year in Review

The reality is that most companies and entities are entrusted with sensitive data. As regulations tighten and consumer expectations rise, it is more important than ever to protect data, whenever it is gathered, accessed, shared, or stored. Let’s take a look at a few of the newsworthy data breaches that happened in 2019. Often, studying these cases can inform SecOps teams about what not to do.

Hacks and Breaches of 2019: A Year in Review Read More →