Recent Ransomware Attacks on U.S. Hospitals Highlight the Inefficiency of Rules-Based Cybersecurity Solutions

A number of recent high profile ransomware attacks on U.S. hospitals have demonstrated the urgency for organizations, municipalities, and critical services to take a proactive approach to protecting networks with a predictive ...

The Case Against Using a Frankenstein Cybersecurity Platform

The cybersecurity market has, simply put, been cobbled together. A tangled web of non-integrated systems and alerts from siloed systems. Enterprises are now being forced to utilize a “Frankenstein” of stitched together ...
Improving on the Typical SIEM Model

Improving on the Typical SIEM Model

Despite its inherent flaws, today’s SIEM software solutions still shine when it comes to searching and investigating log data. One effective, comprehensive approach to network security pairs the best parts of SIEM ...

3 Reasons Why a Rule-Based Cybersecurity Platform Will Always Fail

When it comes to advancements in cybersecurity, rule-based systems are holding the industry back. Relying on humans to constantly input and label rules in order to detect and stay ahead of threats ...
Give me my stats!

Give me my stats!

By Keith J. Jones, Corelight Sr. Security Researcher I often develop packages for Zeek in cluster mode. In this configuration, it can be difficult to debug your package because it is a ...
Data Overload Problem: Data Normalization Strategies Are Expensive

Data Overload Problem: Data Normalization Strategies Are Expensive

Financial institutions spend five to ten million dollars each year managing data. A recent Computer Services Inc (CSI) study reveals that most banks expect to spend up to 40 percent of their ...
Magnify Podcast: Discussing the New Normal with AI Based Cybersecurity Specialists, MixMode

Magnify Podcast: Discussing the New Normal with AI Based Cybersecurity Specialists, MixMode

Geoff Coulehan, MixMode’s Head of Strategic Alliances, joined Secrutiny’s “Magnify Podcast,” to discuss the priorities CISOs should focus on to better protect their now-remote team of employees ...
Phishing for Bitcoin: The Twitter Hack Masterminded by a 17 Year Old

Phishing for Bitcoin: The Twitter Hack Masterminded by a 17 Year Old

The evidence indicates that these attackers are traditionally specialized in hijacking social media accounts via SIM Swapping ...

Webinar Recap: The Next-Generation AI Powered SOC Platform

One thing is clear: more spend does not equal more security and the next generation of cybersecurity tools will route out these inefficiencies ...
Why a Platform With a Generative Baseline Matters

Why a Platform With a Generative Baseline Matters

MixMode creates a generative baseline. Unlike the historically-based baselines provided by add-on NTA solutions, a generative baseline is predictive, real-time, and accurate. MixMode provides anomaly detection and behavioral analytics and the ability ...