Controlling Dwell Time – It’s About Much More than Compliance

Controlling Dwell Time – It’s About Much More than Compliance

Dwell time, or the breach detection gap, are cybersecurity terms used to describe the period of time between malware executing within an environment and it being detected. Detection can be achieved through a variety of security procedures and solutions, however it seems to often occur when an enterprise is notified of suspicious banking activity or a data breach.

Case Study: U.S. Catholic Archdiocese Makes Threat Hunting a Regular Practice

Case Study: U.S. Catholic Archdiocese Makes Threat Hunting a Regular Practice

Learn how one US Catholic Archdiocese empowered its existing IT team to effectively hunt for hidden threats using Infocyte HUNT to bolster their security, and the benefits they have realized since implementing it.

10 Resources to Help Cybersecurity Novices to Pros Stay #CyberAware

10 Resources to Help Cybersecurity Novices to Pros Stay #CyberAware

October is National Cyber Security Awareness Month (NCSAM) and Infocyte is proud to be a NCSAM Champion. We’ve pulled together our top requested resources on enterprise threat hunting to help you better understand the key role it plays in identifying and combating malware and persistent threats that have could be hiding your systems. From enterprise security novices to hunting pros, there’s something for everyone to remain #CyberAware

Malware and its Impact in Educational Institutions

Malware and its Impact in Educational Institutions

Cyber attacks have been on the rise in higher education as the data and IP stored in schools, colleges, and universities are very attractive targets for data hackers. Educational institutions must evolve and adapt to the realities of malware and cyber health to protect against immediate and long-term security threats. Mounting a comprehensive effort, including threat hunting, can address many of the security challenges malware and APTs pose.

Infocyte HUNT: Overall APT Solution of the Year in the 2017 CyberSecurity Breakthrough Awards

Infocyte HUNT: Overall APT Solution of the Year in the 2017 CyberSecurity Breakthrough Awards

We’re pleased to announce that Infocyte HUNT has been selected as Overall APT Solution of the Year  in the 2017 CyberSecurity Breakthrough Awards.

The Role of Automation and Human Analysis in Threat Hunting

The Role of Automation and Human Analysis in Threat Hunting

As new techniques used to evade network defenses continue to emerge, enterprise security teams are increasingly turning to threat hunting to reduce the duration and damage of successful attacks. Yet, what comprises the actual activity of threat hunting is a topic of hot debate among cyber security experts. One of the looming questions on many CISOs minds is: ‘Can threat hunting be automated?’ Hard liners exist on either side of this question, but who is correct?

Anatomy of a Cyber Attack: Understanding the Role of Threat Hunting Technologies

Anatomy of a Cyber Attack: Understanding the Role of Threat Hunting Technologies

Looking to capitalize on the benefits, the security market has suddenly become crowded with solutions that all claim to offer threat hunting capabilities: EDR, DFIR, Behavior Analysis and FSA. We’ve put together a white paper to help you understand the differences between these threat hunting tools and the role each plays in breach detection and prevention, and where solutions such as FSA fit within the tool belt of the hunter.

Banks, Trust and Cyber Security

Banks, Trust and Cyber Security

Banks, and indeed the entire global financial infrastructure, is something we rely on daily to keep economies moving and hold society together. The ever increasing volume and sophistication of financial malware attacks has led regulatory bodies to extend their purview to include cyber security and risk management practices and standards. To date consultations have been underway and we can expect to see enhanced and detailed regulatory guidelines and expectations set both in North America and in Europe in the coming year. Without question, it is in the public interest to keep banks and financial Market Infrastructures cyber secure, which is why some degree of oversight is required.