Zero Day Attacks

Forbes: Comparing Legacy Rules-Based Cybersecurity Platforms And AI-Based Platforms

Chief Scientist and CTO for MixMode, Igor Mezic, wrote this article for Forbes magazine on the advantages of moving away from a legacy rule-based cybersecurity platform to a third-wave AI platform that can better detect zero-day threats.

Forbes: Comparing Legacy Rules-Based Cybersecurity Platforms And AI-Based Platforms Read More →

Dependence on Log Data | An Increasing Vulnerability to Threat Actors

How sure are you that log files represent the best source of information to base your entire Cybersecurity program upon? Log data is the cornerstone of every traditional cybersecurity platform including SIEM (Security Information and Event Management), UEBA (User and Entity Behavior Analytics), and xDR (Detection and Response).

Dependence on Log Data | An Increasing Vulnerability to Threat Actors Read More →

10 Eye-Opening Data Breach Statistics (and How You Can Better Protect Your Network)

While we’re seeing more data breaches than in years past, being proactive can make an enormous difference. Head-in-sand is not the optimal position for any modern organization with a network-based infrastructure. Education about the nature of modern data breaches is a great place to start.

10 Eye-Opening Data Breach Statistics (and How You Can Better Protect Your Network) Read More →

New Video: MixMode Cyber Anomaly Detection Platform

We recently released a new video to better explain how MixMode’s next-generation cybersecurity anomaly detection platform combines the functionality of SIEM, NDR, NTA and UEBA for advanced threat detection, zero day attack identification, false positive alert reduction, forensic investigation and more.

New Video: MixMode Cyber Anomaly Detection Platform Read More →

The Top 5 Considerations That Should Guide Your SOC Strategy in 2021 and Beyond

It’s evident that while organizations are spending more and more on legacy cybersecurity solutions, these platforms are not holding up their end of the deal and are not able to proactively defend in a modern, non-signature attack threatscape.

The Top 5 Considerations That Should Guide Your SOC Strategy in 2021 and Beyond Read More →

SIEM Cannot Detect (and Ignores) Zero-Day Attacks

Organizations are exclusively depending on selective information forwarded to the SIEM. The information that inevitably exists outside the system of record — information relevant for zero-day attacks — is ignored.

SIEM Cannot Detect (and Ignores) Zero-Day Attacks Read More →

Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks

In our newest whitepaper, “Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks,” we dive into how traditional cybersecurity tools work, why this fundamentally limits them from being able to detect zero-day or previously unknown attacks, why the industry standard for breach detection is around six to eight months and how modern, contextually-aware AI overcomes the limitations of traditional cybersecurity solutions.

Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks Read More →

A Modern SOC Should Not Be Entirely Dependent On Human Operators and Their Personal Experience

A modern SOC should not be entirely dependent on human operators and their personal experience. The issue has been a foundational problem with not only the methodologies used by SOCs for the past 15 to 20 years, but it should be questioned whether the problem is actually compounded by the technology itself.

A Modern SOC Should Not Be Entirely Dependent On Human Operators and Their Personal Experience Read More →

3 Reasons Why a Rule-Based Cybersecurity Platform Will Always Fail

When it comes to advancements in cybersecurity, rule-based systems are holding the industry back. Relying on humans to constantly input and label rules in order to detect and stay ahead of threats is a bottleneck process that is setting security teams up for failure, especially with tools like SIEM, NDR, and NTA.

3 Reasons Why a Rule-Based Cybersecurity Platform Will Always Fail Read More →

Why The Future of Cybersecurity Needs Both Humans and AI Working Together

A recent WhiteHat Security survey revealed that more than 70 percent of respondents cited AI-based tools as contributing to more efficiency. More than 55 percent of mundane tasks have been replaced by AI, freeing up analysts for other departmental tasks.

Why The Future of Cybersecurity Needs Both Humans and AI Working Together Read More →

Encryption = Privacy ≠ Security

For the past few years, many have been talking about the changing “threat landscape” as it pertains to the increase in zero day, insider and phishing threats. While all of these threats are on the rise, and constitute a concern, there is, perhaps, an even larger shift presenting a threat to enterprises – the shift

Encryption = Privacy ≠ Security Read More →

The Many Ways Your Employees Can Get Hacked While Working From Home and How to Respond

Although it is not surprising at all that hackers are taking advantage of the global pandemic —phishing threat reports are always highest when there is some natural disaster happening— we have never before had such an unsafe environment to protect. Here are a few of the most popular malicious acts:

The Many Ways Your Employees Can Get Hacked While Working From Home and How to Respond Read More →