A number of recent high profile ransomware attacks on U.S. hospitals have demonstrated the urgency for organizations, municipalities, and critical…
The cybersecurity market has, simply put, been cobbled together. A tangled web of non-integrated systems and alerts from siloed systems.…
Despite its inherent flaws, today’s SIEM software solutions still shine when it comes to searching and investigating log data. One…
When it comes to advancements in cybersecurity, rule-based systems are holding the industry back. Relying on humans to constantly input…
By Keith J. Jones, Corelight Sr. Security Researcher I often develop packages for Zeek in cluster mode. In this configuration,…
Financial institutions spend five to ten million dollars each year managing data. A recent Computer Services Inc (CSI) study reveals…
Geoff Coulehan, MixMode’s Head of Strategic Alliances, joined Secrutiny’s “Magnify Podcast,” to discuss the priorities CISOs should focus on to…
The evidence indicates that these attackers are traditionally specialized in hijacking social media accounts via SIM Swapping.
One thing is clear: more spend does not equal more security and the next generation of cybersecurity tools will route…
MixMode creates a generative baseline. Unlike the historically-based baselines provided by add-on NTA solutions, a generative baseline is predictive, real-time,…