MixModes Approach to Combating The Growing Threat of Identity-Based Attacks on Enterprise Organizations
According to recent studies, over 80% of data breaches are attributed to compromised credentials, highlighting the critical need for robust identity threat detection solutions ... Read More
Visibility is Not Enough to Protect Organizations from Identity Threats
Identity and access management (IAM) has become a critical component of any organization's security strategy. Implementing strict controls over user access and privileges is clearly important for protecting sensitive systems and data. However, relying solely on IAM to secure your environment is insufficient in today's threat landscape. Sophisticated cyber attacks ... Read More
A Proven Strategy For Defending Against Zero-Day Exploits And Attacks — Updated for 2023
Zero-day attacks are considered the number one cybersecurity threat to company networks large and small. Understand what they are, why it's so hard to detect them, and how artificial intelligence (AI) is helping to solve this modern problem ... Read More
MixMode Platform Release: New Executive Summary Dashboard
The MixMode Executive Summary Dashboard provides the necessary information and continuous access to critical details that CISO’s and other cybersecurity leaders need to see on a weekly and monthly basis to understand the health of their cybersecurity program ... Read More
What is Killware: How to Protect Yourself from these Next-Generation Cyberattacks
Not long ago, the concept of killware was the stuff of futuristic, doomsday movie fare. The idea that hackers could breach systems related to basic public infrastructure and health services to put people’s very lives at risk seemed scary, but far-fetched. Unfortunately, that dystopian future has, at least to some ... Read More
Why VPC Flow Logs Are Critical for Comprehensive Cybersecurity Approaches
VPC (virtual private cloud) flow log data contains a wealth of data that can be utilized to gain a clear understanding of a network’s security posture. However, it can be challenging and prohibitively time-consuming for analysts to get a handle on the voluminous number of flow logs ... Read More
Understanding CloudTrail and Why it Matters in Cybersecurity
CloudTrail is a valuable data source that provides insights into API calls used to access AWS accounts, but the service poses several high-level Cybersecurity challenges ... Read More
Encryption = Privacy ≠ Security
For the past few years, many have been talking about the changing “threat landscape” as it pertains to the increase in zero day, insider and phishing threats. While all of these threats are on the rise, and constitute a concern, there is, perhaps, an even larger shift presenting a threat ... Read More
Network Data: The Best Source for Actionable Data in Cybersecurity
With the right tool, your network data can now provide you with most valuable, actionable alerts in your security stack. What follows is a discussion of some of the reasons why you may want to look to your network first when trying to identify potential threats or attacks ... Read More
Case Study: MixMode AI Detects Attack not Found on Threat Intel
In October, 2019 a MixMode customer experienced an incident where an external entity attacked a web server located in their DMZ, compromised it, and then pivoted internally through the DMZ to attempt access of a customer database. While the attacker was successful in penetrating the customer’s network, MixMode was able ... Read More