extortion

IT’s Confidence in Mitigating Cyberthreats Low

As cyberthreats evolve and increase in both voracity and velocity, many IT professionals are becoming increasingly worried about their organization’s ability to deal with those threats. That’s according to the results of ...
Security Boulevard
Guide: How to Choose an AI-Based Cybersecurity Platform

Guide: How to Choose an AI-Based Cybersecurity Platform

Most cybersecurity vendors today tout some form of “Artificial Intelligence” as an underlying mechanism for the differentiation of their product among the market. But if everyone is saying they have AI, and ...

Why The Future of Cybersecurity Needs Both Humans and AI Working Together

A recent WhiteHat Security survey revealed that more than 70 percent of respondents cited AI-based tools as contributing to more efficiency. More than 55 percent of mundane tasks have been replaced by ...
2017 ICIT Winter Summit - General Michael Hayden Keynote

CTO Perspective: Machines Protecting Themselves – The Future of Cybersecurity

We interviewed MixMode CTO Dr. Igor Mezic to better understand how machines should be protecting themselves with AI, what roles humans play, and how the DoD and the private sector both benefit ...

IDC Report: MixMode – An Unsupervised AI-Driven Network Traffic Analysis Platform

IDC, the premier global market intelligence firm, recently released a vendor report on MixMode’s Next-Generation AI Powered network traffic analysis platform. Ritu Jyoti, Program Vice President, Artificial Intelligence (AI) Research with IDC’s ...

Hacking the Hackers: Adversarial AI and How to Fight It

Advances in Artificial Intelligence (AI) have led to smarter, more robust network security platforms that are quickly replacing legacy security solutions ...
Our Top 5 Cybersecurity Insights from 2019

Our Top 5 Cybersecurity Insights from 2019

This year on the MixMode blog, we have covered headline stories, analyzed every pain point within network security, and shared what we believe to be some of the most innovative solutions to ...

Don’t Fall for the Hype – Marketing Myths in Artificial Intelligence for Cybersecurity

The cybersecurity provider landscape is cluttered with impossible claims, misrepresentations, and a confusing mix of inconsistent terminology. Worse, every minute you delay making a decision is another minute hackers have to gain ...

How to Use Your Baseline for Network Security

This is the final article in a three-part series on Network Baselining. Read the first two articles in the series here: 1) An Introduction to Baselining Technology 2) How to Create a ...

How to Create a Baseline for Your Network

We separate the parts that are wavelike and we separate the parts that are stochastic. Then, five minutes later we look again and compare what we’ve seen historically and what the AI ...