AI network monitoring tools

A Proven Strategy For Defending Against Zero-Day Exploits And Attacks — Updated for 2023

Zero-day attacks are considered the number one cybersecurity threat to company networks large and small. Understand what they are, why it’s so hard to detect them, and how artificial intelligence (AI) is helping to solve this modern problem.

A Proven Strategy For Defending Against Zero-Day Exploits And Attacks — Updated for 2023 Read More →

Yesterday’s SIEM Solutions Can’t Combat Today’s Cyberthreats

While it’s true that having a SIEM is better than forgoing network monitoring all together, a standalone SIEM solution is simply insufficient in today’s cybersecurity landscape. Hackers and other bad actors have become more sophisticated — many of today’s cybercriminals can easily outsmart a standard SIEM setup.

Yesterday’s SIEM Solutions Can’t Combat Today’s Cyberthreats Read More →

Don’t Fall for the Hype – Marketing Myths in Artificial Intelligence for Cybersecurity

The cybersecurity provider landscape is cluttered with impossible claims, misrepresentations, and a confusing mix of inconsistent terminology. Worse, every minute you delay making a decision is another minute hackers have to gain access and knowledge about your network.

Don’t Fall for the Hype – Marketing Myths in Artificial Intelligence for Cybersecurity Read More →

Case Study: MixMode AI Detects Attack not Found on Threat Intel

In October, 2019 a MixMode customer experienced an incident where an external entity attacked a web server located in their DMZ, compromised it, and then pivoted internally through the DMZ to attempt access of a customer database. While the attacker was successful in penetrating the customer’s network, MixMode was able to detect the event before they were successful in penetrating the customer database.

Case Study: MixMode AI Detects Attack not Found on Threat Intel Read More →

The Difference Between Artificial Intelligence and Machine Learning in Network Security

Artificial Intelligence (AI) and Machine Learning (ML) are often used interchangeably when discussing developments in deep learning. However, there is an important difference between the two that network security professionals will need to understand in order to serve their clientele effectively.

The Difference Between Artificial Intelligence and Machine Learning in Network Security Read More →

What is Network Detection and Response (NDR)? A beginner’s Guide

Recently, network detection and response, or NDR, has been established as a key tool for companies seeking to improve their threat response. It’s a relatively new network security strategy which developed in response to perceived shortcomings in existing network security systems. We wanted to help explain what modern network detection and response is, how it

What is Network Detection and Response (NDR)? A beginner’s Guide Read More →

Silicon Valley Needs to Step up Their Security: This Week in AI

Silicon Valley Has Let Its Cybersecurity Guard Down According to an article by Brian O’Keefe for Fortune Magazine, Silicon Valley isn’t paying enough attention when it comes to threats posed by state-sponsored hackers. At least, that was the conclusion a group of cybersecurity experts came to in a discussion at the Fortune Brainstorm Tech conference in Aspen, Colo., on

Silicon Valley Needs to Step up Their Security: This Week in AI Read More →

AI-Enabled Cybersecurity Is Necessary for Defense: Capgemini Report

850 senior executives from Information Security, Cybersecurity, and IT Operations in seven industries across ten countries were recently surveyed by consulting and technology services firm, Capgemini, in their “Reinventing Cybersecurity with Artificial Intelligence” report. The goal being to understand today’s benefits, complexities, and levels of implementation of AI in cybersecurity across IT (information technology), OT (operation

AI-Enabled Cybersecurity Is Necessary for Defense: Capgemini Report Read More →

SC Magazine: Beefing Up Your Next Generation Security Tool Set

Originally published on 5/20/19 on scmagazine.com, this article by Dr. Peter Stephenson is the first in a four-part series to help enterprise and security professionals discover the tools needed to deploy a next-generation enterprise security stack. As it features MixMode as the true AI system needed for your deception network, we wanted to share the article here on our

SC Magazine: Beefing Up Your Next Generation Security Tool Set Read More →

Intro to Wire Data: Why Should I Care When I Already Have Log Files?

Most security professionals are well-versed in understanding log files and their importance. Most organizations with a security program operate a SIEM (Security Incident and Event Management) so they can track events around their network. They may use Splunk, FireEye, SolarWinds, QRadar, LogRhythm or many others for a SIEM solution. A SIEM is a very important way to keep track of log

Intro to Wire Data: Why Should I Care When I Already Have Log Files? Read More →