MixModes Approach to Combating The Growing Threat of Identity-Based Attacks on Enterprise Organizations

MixModes Approach to Combating The Growing Threat of Identity-Based Attacks on Enterprise Organizations

According to recent studies, over 80% of data breaches are attributed to compromised credentials, highlighting the critical need for robust identity threat detection solutions ... Read More
Visibility is Not Enough to Protect Organizations from Identity Threats

Visibility is Not Enough to Protect Organizations from Identity Threats

Identity and access management (IAM) has become a critical component of any organization's security strategy. Implementing strict controls over user access and privileges is clearly important for protecting sensitive systems and data. However, relying solely on IAM to secure your environment is insufficient in today's threat landscape. Sophisticated cyber attacks ... Read More
A Proven Strategy For Defending Against Zero-Day Exploits And Attacks — Updated for 2023

A Proven Strategy For Defending Against Zero-Day Exploits And Attacks — Updated for 2023

Zero-day attacks are considered the number one cybersecurity threat to company networks large and small. Understand what they are, why it's so hard to detect them, and how artificial intelligence (AI) is helping to solve this modern problem ... Read More
MixMode Platform Release: New Executive Summary Dashboard

MixMode Platform Release: New Executive Summary Dashboard

The MixMode Executive Summary Dashboard provides the necessary information and continuous access to critical details that CISO’s and other cybersecurity leaders need to see on a weekly and monthly basis to understand the health of their cybersecurity program ... Read More

What is Killware: How to Protect Yourself from these Next-Generation Cyberattacks

Not long ago, the concept of killware was the stuff of futuristic, doomsday movie fare. The idea that hackers could breach systems related to basic public infrastructure and health services to put people’s very lives at risk seemed scary, but far-fetched. Unfortunately, that dystopian future has, at least to some ... Read More

Why VPC Flow Logs Are Critical for Comprehensive Cybersecurity Approaches

VPC (virtual private cloud) flow log data contains a wealth of data that can be utilized to gain a clear understanding of a network’s security posture. However, it can be challenging and prohibitively time-consuming for analysts to get a handle on the voluminous number of flow logs ... Read More

Understanding CloudTrail and Why it Matters in Cybersecurity

CloudTrail is a valuable data source that provides insights into API calls used to access AWS accounts, but the service poses several high-level Cybersecurity challenges ... Read More
Encryption = Privacy ≠ Security

Encryption = Privacy ≠ Security

For the past few years, many have been talking about the changing “threat landscape” as it pertains to the increase in zero day, insider and phishing threats. While all of these threats are on the rise, and constitute a concern, there is, perhaps, an even larger shift presenting a threat ... Read More

Network Data: The Best Source for Actionable Data in Cybersecurity

With the right tool, your network data can now provide you with most valuable, actionable alerts in your security stack. What follows is a discussion of some of the reasons why you may want to look to your network first when trying to identify potential threats or attacks ... Read More
Case Study: MixMode AI Detects Attack not Found on Threat Intel

Case Study: MixMode AI Detects Attack not Found on Threat Intel

In October, 2019 a MixMode customer experienced an incident where an external entity attacked a web server located in their DMZ, compromised it, and then pivoted internally through the DMZ to attempt access of a customer database. While the attacker was successful in penetrating the customer’s network, MixMode was able ... Read More

Secure Guardrails