Geoff Coulehan, MixMode’s Head of Strategic Alliances, joined Secrutiny’s “Magnify Podcast,” to discuss the priorities CISOs should focus on to better protect their now-remote team of employees.
MixMode creates a generative baseline. Unlike the historically-based baselines provided by add-on NTA solutions, a generative baseline is predictive, real-time, and accurate. MixMode provides anomaly detection and behavioral analytics and the ability to suppress false positives and surface true positives.
Artificial Intelligence – or AI – has become a buzzword since it emerged in the 1950s. However, all AI systems are not created equal. In our white paper, “Self-Supervised Learning – AI For Complex Network Security,” Dr. Peter Stephenson explains the different “waves” of artificial intelligence. He uses the DARPA definitions for each of these …
Our newest whitepaper, “How Predictive AI is Disrupting the Cybersecurity Industry,” evaluates several common SecOps issues around Network Traffic Analysis, explaining why typical solutions are wholly ineffective and represent sunk costs versus added value. We examine how self-supervised learning AI is poised to overcome the SecOps challenges of protecting today’s distributed networks.
The 2020 Clearview AI data breach spawned hundreds of attention-grabbing headlines, and for good reason. The company works closely with law enforcement agencies and other entities by sharing personal information about millions of people, for a variety of purposes. The breach raised many questions about the vulnerability of personal data in general.
For the past few years, a major problem has been mounting in the cybersecurity industry: a people shortage. Even before the outbreak of the current global pandemic, enterprises were hurting in the cybersecurity hiring department. Companies are struggling to find employable cybersecurity professionals to handle an ever increasing and evolving number of new threats from …
In today’s ever evolving cybersecurity landscape there are major problems facing professionals that continue to worsen. These problems center around a shortage of tools advanced enough to understand the baseline of a network in order to pinpoint anomalies and a massive information overload problem in the form of security alerts.
In a recent blog post, our Head of Customer Success, Russell Gray, outlined the reasons why network data is the best source for actionable data in cybersecurity. He covered the limitations of each of the elements of a typical security stack (SIEM, Endpoint, and Firewall) and the importance of network traffic analysis (NTA) in the …
After suffering a possible breach, a client approached the team at Nisos for help evaluating the security of their AWS environment. The client was concerned about possible malicious activity on the part of a former employee who had maintained an AWS Identity and Access Management (IAM) account after being separated.