SIEM

Featured Use Case: Why a Large US Utility Company Turned to MixMode to Address Utility Grid Vulnerabilities

A large utility company approached MixMode with the following scenario: The enterprise SOC was utilizing a shared SIEM application that…

3 days ago

Security Analytics and SIEM Best Practices

SIEM (Security Information and Event Management) and AI-Based Security Analytics is something of a match... The post Security Analytics and…

5 days ago

Introducing the Cloud Sensor for GCP

By Vijit Nair, Sr. Director, Product Management, Corelight Visibility is paramount in securing your cloud environment – as the adage…

2 weeks ago

Why SIEMs need threat intelligence to defeat Cyberthreats

Security professionals the world over crave compliance management and the ability to pull deep insights from their complex IT environments.…

2 weeks ago

5 user behavioral patterns to look out for in a decentralized workspace

Problem: If there are thousands of employees scattered around hundreds of places, how do you keep your organization’s network safe?…

3 weeks ago

Featured Use Case: Why a Large Government Entity Replaced Their SIEM with MixMode

Despite a three-year SIEM deployment and a two-year UBA deployment, government personnel needed an alternative to better detect and manage…

3 weeks ago

How Vendors Capitalize on SIEM’s Fundamental Flaws

Because the fundamental nature of SIEM requires infinite amounts of data, security teams are forced to constantly wrangle their network…

1 month ago

A Return to Logs to Unjam the Security Deficit

Some years ago, during the renaissance of security information and event management (SIEM), security became log crazy. The hope was…

1 month ago

The Case Against Using a Frankenstein Cybersecurity Platform

The cybersecurity market has, simply put, been cobbled together. A tangled web of non-integrated systems and alerts from siloed systems.…

1 month ago

Improving on the Typical SIEM Model

Despite its inherent flaws, today’s SIEM software solutions still shine when it comes to searching and investigating log data. One…

1 month ago