Skip to content

Infocyte

cybersecurity jobs shortage

5 Considerations For Recruiting (and Retaining) Cybersecurity Talent

November 1, 2019

It’s no secret — there’s a severe talent shortage in cybersecurity, and cyber criminals are aware of this critical lack of resources. Recently, bipartisan research agency The Center for Strategic & International Studies (CSIS) carried out a survey of IT decision-makers across eight countries. The topic? The ever-present talent and skills gap in the cybersecurity…

Read More »
information security devops secops

From DevOps to SecOps: An Introduction

October 24, 2019

Due to the increasing demand for new applications and software, DevOps has become a truly mainstream development practice. DevOps helps organizations to deliver products and services much quicker than traditional development methodologies. DevOps encourages collaboration between operations and development teams. However, sometimes fast development comes at the expense of security. The transition from DevOps to…

Read More »
endpoint security software extensions

Advance and Automate Your Endpoint Security Software with Infocyte Extensions

October 23, 2019

Earlier this month, we announced a breakthrough feature within our agentless detection and response platform — Extensions. This new feature enables security teams to integrate, automate, and extend their endpoint security software tools: Endpoint Detection and Response (EDR) platforms, Security Information Event Management (SIEM) tools, Security Orchestration Automation and Response (SOAR) platform, and more. First and…

Read More »
infocyte incident response platform extensions

Infocyte Release Notes, October 2019: Incident Response Ready Program and Platform Extensions

October 15, 2019

Currently, Infocyte is capable of detecting a vast array of cyber threats — ransomware, file-less attacks, advanced persistent threats, etc. — that exist within an environment. Our detection and response platform does this by leveraging multiple sources of threat intelligence feeds and enriching that threat data with our proprietary INCYTE™ machine learning; however, there are…

Read More »
cyber security incident response process

IR Planning: The Critical 6 Steps of Cyber Security Incident Response

October 2, 2019

Our data, services, and infrastructures are attacked constantly by ransomware, malware, cyber attackers… the list goes on. Despite our best efforts to stop them, most organizations will experience the dreadful outcomes of a data breach. When this happens, you initiate your (hopefully, updated and well-practiced) cyber security incident response plan. The Incident Response Process Your…

Read More »
infocyte mdr default blog image

Infocyte Release Notes, September 2019: Dwell Time Dashboards

September 19, 2019

One of the key value propositions of our managed detection and response (MDR) platform and the reason why proactive cyber security has evolved as a commonplace practice is the need to control (and reduce) dwell time. Dwell time signifies the amount of time threat actors and malicious activities go undetected in an environment. Infocyte drastically…

Read More »
cyber incident response team

A Practical Guide to Building a Cyber Incident Response Team

September 4, 2019

While there are a number of threat and risk management solutions that help your personnel deal with low-level security events by automating responses, high-level threats (sophisticated and stealthy attacks) including advanced persistent threats (APTs) require a cyber incident response team — equipped and ready to act, fast. This team could be: A standing team within…

Read More »
windows 7 vulnerabilities exploits

The Pending Windows 7 Vulnerabilities Your Org Needs to Prepare for, Now

August 29, 2019

Preparing for the Windows 7 Sunset Support for Windows 7 is ending. That much is certain. After January 14, 2020, free technical assistance and software updates from Windows Update will no longer be available for the product, although support will be available to Enterprise and Microsoft 365 customers who can buy security updates on a…

Read More »
endpoint security advanced cyber attacks

Network and Endpoint Security Still a Challenge for Small and Mid-market Companies

August 20, 2019

Knowledge is power, and for the small and mid-market, knowing what threats and vulnerabilities are lurking within your network environment is key. To do this effectively, one cannot simply rely on defensive measures — firewalls, AV software, and other network security and endpoint security tools — without a proactive component. Regardless of what cybersecurity framework…

Read More »
ai deep learning cybersecurity

5 Amazing Applications of Deep Learning in Cybersecurity

August 13, 2019

Artificial Intelligence (AI) is revolutionizing almost every industry. Deep Learning (DL) an AI methodology, is propelling the high-tech industry to the future with a seemingly endless list of applications ranging from object recognition for systems in autonomous vehicles to potentially saving lives — helping doctors detect and diagnose cancer with greater accuracy.  In this article,…

Read More »