zero-day attack

New Video: MixMode Cyber Anomaly Detection Platform

We recently released a new video to better explain how MixMode’s next-generation cybersecurity anomaly detection platform combines the functionality of SIEM, NDR, NTA and UEBA for advanced threat detection, zero day attack identification, false positive alert reduction, forensic investigation and more.

The Top 5 Considerations That Should Guide Your SOC Strategy in 2021 and Beyond

It’s evident that while organizations are spending more and more on legacy cybersecurity solutions, these platforms are not holding up their end of the deal and are not able to proactively defend in a modern, non-signature attack threatscape.

Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks

In our newest whitepaper, “Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks,” we dive into how traditional cybersecurity tools work, why this fundamentally limits them from being able to detect zero-day or previously unknown attacks, why the industry standard for breach detection is around six to eight months and how modern, contextually-aware AI overcomes the limitations of traditional cybersecurity solutions.

The Many Ways Your Employees Can Get Hacked While Working From Home and How to Respond

Although it is not surprising at all that hackers are taking advantage of the global pandemic —phishing threat reports are always highest when there is some natural disaster happening— we have never before had such an unsafe environment to protect. Here are a few of the most popular malicious acts:

The Big Switch: A Lack of Employable Security Professionals Causes Companies to Make the Switch to AI

For the past few years, a major problem has been mounting in the cybersecurity industry: a people shortage. Even before the outbreak of the current global pandemic, enterprises were hurting in the cybersecurity hiring department.  Companies are struggling to find employable cybersecurity professionals to handle an ever increasing and evolving number of new threats from …

The Big Switch: A Lack of Employable Security Professionals Causes Companies to Make the Switch to AI Read More →

The Top 8 Concerns for CISO’s in 2020

Although a relatively new corporate position, Chief Information Security Officers (CISOs) are becoming an integral part of the corporate hierarchy as enterprises begin to take security concerns more seriously. It’s a smart move considering that in 2019 security breaches cost companies on average $3.92 million. Now in 2020, CISOs are facing accelerating old threats along with some brand new ones. Here are the top eight CISO concerns of 2020:

Hacks and Breaches of 2019: A Year in Review

The reality is that most companies and entities are entrusted with sensitive data. As regulations tighten and consumer expectations rise, it is more important than ever to protect data, whenever it is gathered, accessed, shared, or stored. Let’s take a look at a few of the newsworthy data breaches that happened in 2019. Often, studying these cases can inform SecOps teams about what not to do.

Case Study: MixMode AI Detects Attack not Found on Threat Intel

In October, 2019 a MixMode customer experienced an incident where an external entity attacked a web server located in their DMZ, compromised it, and then pivoted internally through the DMZ to attempt access of a customer database. While the attacker was successful in penetrating the customer’s network, MixMode was able to detect the event before they were successful in penetrating the customer database.

Web App Security: Necessary, Vulnerable, and In Need of AI for Security

Web applications are a necessary part of doing business in 2019. Walk into any department in any company — large or small — and employees likely have several web app browsers on their screen that are making their job function easier. We are talking the sites that modern day businesses depend on: Google Cloud, Slack, WordPress, DropBox, PayPal, Shopify, Salesforce…and the list goes …

Web App Security: Necessary, Vulnerable, and In Need of AI for Security Read More →