Network monitoring tools

New Video: Why is network data the best source for actionable data in cybersecurity?

In a recent blog post, our Head of Customer Success, Russell Gray, outlined the reasons why network data is the best source for actionable data in cybersecurity. He covered the limitations of each of the elements of a typical security stack (SIEM, Endpoint, and Firewall) and the importance of network traffic analysis (NTA) in the …

New Video: Why is network data the best source for actionable data in cybersecurity? Read More →

What is Network Detection and Response (NDR)? A beginner’s Guide

Recently, network detection and response, or NDR, has been established as a key tool for companies seeking to improve their threat response. It’s a relatively new network security strategy which developed in response to perceived shortcomings in existing network security systems. We wanted to help explain what modern network detection and response is, how it …

What is Network Detection and Response (NDR)? A beginner’s Guide Read More →

Silicon Valley Needs to Step up Their Security: This Week in AI

Silicon Valley Has Let Its Cybersecurity Guard Down According to an article by Brian O’Keefe for Fortune Magazine, Silicon Valley isn’t paying enough attention when it comes to threats posed by state-sponsored hackers. At least, that was the conclusion a group of cybersecurity experts came to in a discussion at the Fortune Brainstorm Tech conference in Aspen, Colo., on …

Silicon Valley Needs to Step up Their Security: This Week in AI Read More →

SC Magazine: Beefing Up Your Next Generation Security Tool Set

Originally published on 5/20/19 on scmagazine.com, this article by Dr. Peter Stephenson is the first in a four-part series to help enterprise and security professionals discover the tools needed to deploy a next-generation enterprise security stack. As it features MixMode as the true AI system needed for your deception network, we wanted to share the article here on our …

SC Magazine: Beefing Up Your Next Generation Security Tool Set Read More →

Intro to Wire Data: Why Should I Care When I Already Have Log Files?

Most security professionals are well-versed in understanding log files and their importance. Most organizations with a security program operate a SIEM (Security Incident and Event Management) so they can track events around their network. They may use Splunk, FireEye, SolarWinds, QRadar, LogRhythm or many others for a SIEM solution. A SIEM is a very important way to keep track of log …

Intro to Wire Data: Why Should I Care When I Already Have Log Files? Read More →

How AI is Solving the False Positives Problem in Network Security

How AI is Solving the False Positives Problem in Network Security By Ana Mezic, Marketing Coordinator at MixMode The term “False Positives” is trending in the cybersecurity industry right now. Rightfully so. Managing the impossible amount of alerts IT teams get from their cybersecurity software is an issue that demands a solution as hackers and gatekeepers play tug-of-war …

How AI is Solving the False Positives Problem in Network Security Read More →

5 Reasons Why Context-aware Artificial Intelligence (Caai) Is Needed in Cybersecurity

5 reasons why Context-Aware Artificial Intelligence (CAAI) is needed in Cybersecurity CAAI delivers understanding of the network baseline and reducing false positives By Dr. Igor Mezic, CTO and Chief Scientist  Artificial Intelligence (AI) has surfaced as the technology of the day, in the same way internet, personal computers, airplanes and cars have in earlier eras. And, just like these others …

5 Reasons Why Context-aware Artificial Intelligence (Caai) Is Needed in Cybersecurity Read More →