2019 Data Breaches By the Numbers

2019 Data Breaches By the Numbers

| | Blog, Data breach, Data breaches
We looked at trusted sources in our industry like the Ponemon Institute, FBI Internet Crime Complaint Center (C3), and Global Market Insights to round up the top numbers you should know about data breaches that happened over the past year ... Read More

Staying CCPA Compliant with MixMode’s Unsupervised AI

Companies are expected to spend up to $55 billion dollars on efforts to comply with the California Consumer Privacy Act (CCPA), which is still working out its final rules after going into effect this month ... Read More

Wire Data: What is it Good For?

Today’s security and IT teams are increasingly relying on wire data to better secure their networks. A recent report conducted by network performance and security monitoring vendor VIAVI revealed that more network teams than ever consider wire data the most important data source when confronting security incidents ... Read More

Yesterday’s SIEM Solutions Can’t Combat Today’s Cyberthreats

While it’s true that having a SIEM is better than forgoing network monitoring all together, a standalone SIEM solution is simply insufficient in today’s cybersecurity landscape. Hackers and other bad actors have become more sophisticated -- many of today’s cybercriminals can easily outsmart a standard SIEM setup ... Read More

Hacking the Hackers: Adversarial AI and How to Fight It

Advances in Artificial Intelligence (AI) have led to smarter, more robust network security platforms that are quickly replacing legacy security solutions ... Read More

Generative Unsupervised Learning vs. Discriminative Clustering Technology: Which Prevents Zero-Day Attacks?

Knowing the difference between Discriminative and Generative Unsupervised Learning can tell you a lot about the effectiveness of a cybersecurity solution’s artificial intelligence, for example, whether or not that security solution can perform actions like identifying and stopping a zero-day attack ... Read More

How to Use Your Baseline for Network Security

This is the final article in a three-part series on Network Baselining. Read the first two articles in the series here: 1) An Introduction to Baselining Technology 2) How to Create a Baseline for Your Network ... Read More

How to Create a Baseline for Your Network

We separate the parts that are wavelike and we separate the parts that are stochastic. Then, five minutes later we look again and compare what we’ve seen historically and what the AI has predicted to happen to the current state of the network. If they are different, that’s an anomaly ... Read More

An Introduction to Baselining Technology

This is the first installment of the three part blog series on creating baselines of network behavior to improve your security stance. Here we will walk you through the basics of baselining technology ... Read More

Multi-Stream Cybersecurity and How it Can Save Your Business from a Zero-Day Attack

The best way to detect threats across an entire network in the quickest manner is to have complete visibility over every part of that network with a multi-stream platform which can incorporate not only network data, but Cloud Data and SIEM logs as well ... Read More