The Need for Deterministic Security

Why Do Zero Day Security Technologies Fail to Protect Against Zero Day Attacks?

Today's security technologies fail to detect true zero day attacks, K2 has a video that explains why these security technologies fail to protect against zero day attacks and the need for deterministic ...

Webinar Recap: The Failed Promises of SIEM

MixMode teamed up with Ravenii to host a webinar focused on the history and evolution of SIEM platforms, their ideal role in a SOC today, and how they fall short as a ...

3 Reasons Why a Rule-Based Cybersecurity Platform Will Always Fail

When it comes to advancements in cybersecurity, rule-based systems are holding the industry back. Relying on humans to constantly input and label rules in order to detect and stay ahead of threats ...

Why The Future of Cybersecurity Needs Both Humans and AI Working Together

A recent WhiteHat Security survey revealed that more than 70 percent of respondents cited AI-based tools as contributing to more efficiency. More than 55 percent of mundane tasks have been replaced by ...
The Need for Deterministic Security

Attack Worries Increase as Pandemic Continues

A new Deloitte survey of executives decision makers found that 69% of these executives expect the number and size of cyber events targeting their organizations to increase in the coming year The ...
Encryption = Privacy ≠ Security

Encryption = Privacy ≠ Security

For the past few years, many have been talking about the changing “threat landscape” as it pertains to the increase in zero day, insider and phishing threats. While all of these threats ...
5 CISO Priorities During the COVID-19 Response

5 CISO Priorities During the COVID-19 Response

Imagine serving as a CISO for a prominent enterprise and being thrown into a situation where overnight 80 to 100 percent of your workforce moves inside and begins working remotely. The logistics ...

The Many Ways Your Employees Can Get Hacked While Working From Home and How to Respond

Although it is not surprising at all that hackers are taking advantage of the global pandemic —phishing threat reports are always highest when there is some natural disaster happening— we have never ...
2017 ICIT Winter Summit - General Michael Hayden Keynote

CTO Perspective: Machines Protecting Themselves – The Future of Cybersecurity

We interviewed MixMode CTO Dr. Igor Mezic to better understand how machines should be protecting themselves with AI, what roles humans play, and how the DoD and the private sector both benefit ...

What the Clearview AI Breach Tells Us About Cybersecurity Today

The 2020 Clearview AI data breach spawned hundreds of attention-grabbing headlines, and for good reason. The company works closely with law enforcement agencies and other entities by sharing personal information about millions ...