Top Challenges and Benefits to Building a Threat Hunting Program

Top Challenges and Benefits to Building a Threat Hunting Program

Threat hunting is gaining momentum in the industry as IT and security teams attempt to keep up with the constant barrage of new cyber threats and malware attacks. Organizations are quickly recognizing it is no longer enough to be reactive, but instead they must be proactive to stay ahead of hackers and those who look to steal data or wreak havoc on systems. While companies are increasingly acknowledging they need to adopt threat hunting practices, according to a recent survey published by the SANS Institute many are struggling to adapt. 

Uncovering a Major Hidden Risk of GDPR Legislation

Uncovering a Major Hidden Risk of GDPR Legislation

All companies in Europe today are focused on GDPR compliance. The smart ones are approaching the preparation for future compliance in a methodical and phased way, beginning with an assessment of the current data protection measures in place and identifying gaps or other threats to data security.

Protecting the Enterprise in the Era of Malware-as-a-Service

Protecting the Enterprise in the Era of Malware-as-a-Service

The global WannaCry epidemic has brought malware to the forefront of every major news outlet and has every enterprise security team scrambling to either undo the damage or ensure that their systems are not compromised. The rise of Malware-as-a-service is fueling the attacks, and leaving enterprises wondering how do we better protect ourselves?

InterContinental Hotels Finds an Unwelcome Guest in 1,175 Properties: Malware

InterContinental Hotels Finds an Unwelcome Guest in 1,175 Properties: Malware

Worldwide hotel group InterContinental Hotels, with brands including Holiday Inn Express, Holiday Inn, Candlewood Suites, Staybridge Suites, Crowne Plaza, Hotel Indigo, and Holiday Inn Resort, has reported an unwelcome guest in nearly one third of their 5,000 global properties: malware.

Webinar Highlights: SANS and Infocyte Detail a New DFIR-based Approach to Threat Hunting

Webinar Highlights: SANS and Infocyte Detail a New DFIR-based Approach to Threat Hunting

Last week forensic expert Alissa Torres from the SANS Institute and Infocyte’s co-founder Chris Gerritz hosted a Webinar on Forensic State Analysis: A New Approach to Threat Hunting. In it they discussed how to adapt Digital Forensics & Incident Response (DFIR) techniques to scalably and proactively hunt for unknown threats across an entire enterprise network. If you missed the webinar here’s some highlights.

Scaling the Hunt for Fileless Malware

Scaling the Hunt for Fileless Malware

The recent explosion in mainstream attacks using “fileless” malware has left many organizations wondering how they can defend themselves. Infocyte has taken a unique approach to threat hunting that works by scanning key parts of volatile memory across thousands of systems at a time, making it possible to detect fileless malware at enterprise scale.