SIEM

Gartner Security & Risk Management Summit 2023 Recap

One of the key predictions is that by 2027, 50% of chief information security officers (CISOs) will adopt human-centric design practices in their cybersecurity programs to minimize operational friction and maximize control adoption. This approach focuses on designing security controls around individuals rather than technology or threats. It recognizes that employees play a crucial role in cybersecurity and aims to reduce the likelihood of risky behavior.

Gartner Security & Risk Management Summit 2023 Recap Read More →

eBook: The Inefficiencies of Legacy Tools – Why SIEMs Alone Are Ineffective At Detecting Advanced Attacks

Relying solely on legacy Security Information and Event Management (SIEM) technology is no longer sufficient to protect enterprise organizations from the rising amount of modern, ai-developed, sophisticated cyberattacks. In our newest eBook, we examine the limitations of SIEMs and emphasize the need for an AI-driven dynamic threat detection and response platform.

eBook: The Inefficiencies of Legacy Tools – Why SIEMs Alone Are Ineffective At Detecting Advanced Attacks Read More →

How to Detect PowerDrop Command & Control Malware

MixMode Sales Engineer, Josh Snow, explores a real-time threat detection use case involving The MixMode Platform and its ability to identify PowerDrop, a malicious Powershell script that has been specifically targeting the aerospace industry and shows how MixMode’s Third Wave AI detects PowerDrop and gain insights into what this threat entails.

How to Detect PowerDrop Command & Control Malware Read More →

451 Research Finds Self-Learning Technology to Address Cybersecurity Blind Spots and Reduce Analyst Burnout

In the report, 451 Research explains why security analytics needs to include advanced Third-Wave AI, which autonomously learns normal behavior and adapts to constantly changing network environments, to address the next generation of cyberthreats and increase SOC productivity.

451 Research Finds Self-Learning Technology to Address Cybersecurity Blind Spots and Reduce Analyst Burnout Read More →

Can Your Cyber Tools Monitor Any Stream of Data?

It’s the open secret no one’s talking about — too many cybersecurity solutions in the marketplace stand no chance of providing comprehensive coverage because they are incapable of handling data arising from all sources. Many available solutions are effectively legacy platforms hiding within fresh marketing packages.

Can Your Cyber Tools Monitor Any Stream of Data? Read More →

Updated for 2022: What is Network Detection and Response (NDR)? A Beginner’s Guide

Network detection and response, or NDR, has been established as a key tool for companies seeking to improve their threat response. It has become a network security strategy which developed in response to perceived shortcomings in existing network security systems.

Updated for 2022: What is Network Detection and Response (NDR)? A Beginner’s Guide Read More →

Video: Why a U.S. City Chose MixMode and Decommissioned their UBA Platform

MixMode’s Head of Sales and Alliances, Geoff Coulehan, shares how MixMode was able to identify critical risk factors coming from inside bad actors that had gone undetected by a large U.S. city’s SIEM and UBA platforms despite their multi-year deployments and their decision to decommission their User Behavior Analytics (UBA) platform. 

Video: Why a U.S. City Chose MixMode and Decommissioned their UBA Platform Read More →

Cybersecurity Acronyms: Making Sense of the Alphabet Soup

Trying to decipher Cybersecurity jargon can feel like trying to make sense out of a spoonful of alphabet soup. Is your SIEM equipped with sufficient NTA? What about your XDR? Or wait, was it NDR? What’s IRM, anyway? And whatever happened to UEBA?

Cybersecurity Acronyms: Making Sense of the Alphabet Soup Read More →

Webinar Recap: Why Your Legacy Cyber Platforms Can’t Defend Against Modern Day Attacks

In partnership with Ravenii, our 60-minute talk was hosted by MixMode’s Head of Sales and Alliances, Geoff Coulehan, CEO of Ravenii, Jeff Shipley, and MixMode’s CTO & Chief Scientist, Igor Mezic. They discussed key topics including:

Webinar Recap: Why Your Legacy Cyber Platforms Can’t Defend Against Modern Day Attacks Read More →

New Video: MixMode Cyber Anomaly Detection Platform

We recently released a new video to better explain how MixMode’s next-generation cybersecurity anomaly detection platform combines the functionality of SIEM, NDR, NTA and UEBA for advanced threat detection, zero day attack identification, false positive alert reduction, forensic investigation and more.

New Video: MixMode Cyber Anomaly Detection Platform Read More →

The Top 5 Considerations That Should Guide Your SOC Strategy in 2021 and Beyond

It’s evident that while organizations are spending more and more on legacy cybersecurity solutions, these platforms are not holding up their end of the deal and are not able to proactively defend in a modern, non-signature attack threatscape.

The Top 5 Considerations That Should Guide Your SOC Strategy in 2021 and Beyond Read More →

Third-wave AI has Proven More Effective than Traditional Cybersecurity Platforms and Methodologies

Unfortunately, the majority of cybersecurity solutions available today rely on outdated applications for AI. So-called first- and second-wave AI solutions don’t cut it, but few vendors have the technical capabilities and know-how to apply cutting edge, third-wave AI to their platforms.

Third-wave AI has Proven More Effective than Traditional Cybersecurity Platforms and Methodologies Read More →

SIEM Cannot Detect (and Ignores) Zero-Day Attacks

Organizations are exclusively depending on selective information forwarded to the SIEM. The information that inevitably exists outside the system of record — information relevant for zero-day attacks — is ignored.

SIEM Cannot Detect (and Ignores) Zero-Day Attacks Read More →

Cybersecurity Spend for Data Retention and Analysis is Out of Control and Largely Unnecessary

Managing a relatively small, stable data store is one thing, but dynamic companies face immense challenges when those circumstances change. Data growth can become unwieldy to safeguard when it has to be carefully prepared through a series of time-consuming, manual processes before the security software can evaluate it.

Cybersecurity Spend for Data Retention and Analysis is Out of Control and Largely Unnecessary Read More →

The Aggregation Model is Falling Short

The following is an excerpt from our recent whitepaper, “Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks,” in which we dive into how traditional cybersecurity tools work, why this fundamentally limits them from being able to detect zero-day or previously unknown attacks, why the industry standard for breach detection is around

The Aggregation Model is Falling Short Read More →