Generative Unsupervised Learning vs. Discriminative Clustering Technology: Which Prevents Zero-Day Attacks?

Knowing the difference between Discriminative and Generative Unsupervised Learning can tell you a lot about the effectiveness of a cybersecurity solution’s artificial intelligence, for example, whether or not that security solution can ...

What Does Your Current Security Infrastructure Look Like?

SlashNext recently sponsored a Dark Reading Malware and Threat Survey – 2019 Online Malware […] ...
Case Study: MixMode AI Detects Attack not Found on Threat Intel

Case Study: MixMode AI Detects Attack not Found on Threat Intel

In October, 2019 a MixMode customer experienced an incident where an external entity attacked a web server located in their DMZ, compromised it, and then pivoted internally through the DMZ to attempt ...

An Introduction to Baselining Technology

This is the first installment of the three part blog series on creating baselines of network behavior to improve your security stance. Here we will walk you through the basics of baselining ...

Multi-Stream Cybersecurity and How it Can Save Your Business from a Zero-Day Attack

The best way to detect threats across an entire network in the quickest manner is to have complete visibility over every part of that network with a multi-stream platform which can incorporate ...

Dynamic and Flexible AI for Network Security

Third-Wave artificial intelligence (also known as Wave 3 AI), is making life a whole lot easier for security systems administrators. It seems like we just passed the milestones of incorporating AI into ...
Leveraging MixMOde to monitor AWS Cloudtrail

Leveraging MixMOde to monitor AWS Cloudtrail

We ingest your CloudTrail logs into our platform, apply a layer of our Proprietary Artificial Intelligence to give you advanced anomaly detection and alerting, correlate those anomalies with your underlying network data ...

Top Security Pain Points Revealed: Building Baselines, Cloud, and Visibility Among Concerns

Effective modern network security needs to defend against an unprecedented number of threats. Today’s SecOps teams face both rudimentary hacking attempts and highly sophisticated, targeted attacks that pose serious safety and security ...
E-Book: How Unsupervised Learning AI Will Solve ALL Major Roadblocks in the Cybersecurity Industry

E-Book: How Unsupervised Learning AI Will Solve ALL Major Roadblocks in the Cybersecurity Industry

Security experts and researchers are harnessing AI and ML to create products and solutions for an industry faced with rising and highly intelligent cybercrime and legacy stacks that leave advanced breaches undetected ...

What is Network Traffic Analysis? A Beginners Guide

Network Traffic Analysis (NTA) is one of these newer advancements in cybersecurity. NTA allows the analysis of network traffic (hence the name) at a granular, packet-by-packet level ...
Loading...