Cybersecurity is Facing a Cataclysmic Problem

Cybersecurity is Facing a Cataclysmic Problem

At a time when cybersecurity threats are at an all-time high, an alarming statistic is emerging: Professionals in this field are experiencing high levels of stress and burnout ...
Modernizing Phoenix's Cybersecurity to Combat Nation-State Attacks

Video: Modernizing Phoenix’s Cybersecurity to Combat Nation-State Attacks

Shannon Lawson, CISO for the City of Phoenix, and Geoffrey Coulehan, Head of Sales for MixMode recently joined forces for a fireside chat at the Evanta CISO Summit in Phoenix, AZ. Lawson ...

Financial Services IT Teams Relying on Legacy Cybersecurity Plagued By False Positives and Negatives

Cybersecurity teams working in financial and banking settings face a constant struggle — protecting industry regulated data with limited resources. The situation can reach a breaking point when these teams become overwhelmed ...

U.S. Cities Relying on Legacy Cybersecurity Plagued By False Positives and Negatives

Cybersecurity teams working in municipal settings face a constant struggle — protecting vital public network infrastructure with limited resources. The situation can reach a breaking point when these teams become overwhelmed managing ...

Can Your Enterprise Cybersecurity Solution Solve These Two Challenges? You May Be More Vulnerable Than You Realize

Of all the challenges facing the modern SOC, two stand out among the most persistent and difficult to overcome: an overwhelming volume of false positive alerts and an alarming escalation in zero-day ...

Better Anomaly Detection Is Key to Solving the False Positive Problem Once and for All

Keeping up with security alerts can be a Herculean task without the right tools on board. Security teams face more than 11,000 alerts per day on average, according to industry analysts — ...
When Your EDR Vendor Attacks!

When Your EDR Vendor Attacks!

Florian Roth, Head of Research at Nextron Systems in Germany, received a series of alerts on Nov. 6 that had all the telltale signs of a potentially serious security breach ...

What is Anomaly Detection in Cybersecurity?

Anomaly detection, the “identification of rare occurrences, items, or events of concern due to their differing characteristics from the majority of the processed data,” allows organizations to track “security errors, structural defects ...

Risks of Evidentiary Software

Over at Lawfare, Susan Landau has an excellent essay on the risks posed by software used to collect evidence (a Breathalyzer is probably the most obvious example). Bugs and vulnerabilities can lead ...
The Most Important Question to Ask Security Vendors Before Hiring Them

The Most Important Question to Ask Security Vendors Before Hiring Them

False positives remain a significant concern that affects your chances of closing a deal or making a sale. The post The Most Important Question to Ask Security Vendors Before Hiring Them appeared ...