Banks, Trust and Cyber Security

Banks, Trust and Cyber Security

Banks, and indeed the entire global financial infrastructure, is something we rely on daily to keep economies moving and hold society together. The ever increasing volume and sophistication of financial malware attacks has led regulatory bodies to extend their purview to include cyber security and risk management practices and standards. To date consultations have been underway and we can expect to see enhanced and detailed regulatory guidelines and expectations set both in North America and in Europe in the coming year. Without question, it is in the public interest to keep banks and financial Market Infrastructures cyber secure, which is why some degree of oversight is required.

Protecting Democratic Elections from Cyber Attack

Protecting Democratic Elections from Cyber Attack

German elections are scheduled for September, and the country's authorities are determined to conduct them without interference, especially Russian interference. Operations to influence electoral outcomes have been ongoing for over 10 years. As these operations grow in frequency, reach and sophistication, it becomes all the more important to take action to prepare and react to election cyber attacks.

Protecting the Enterprise Against Unknown Malware

Protecting the Enterprise Against Unknown Malware

Last year stands out for the astronomical growth of malware, resulting in a significant increase in the sheer volume of cyber attacks on enterprises, organizations, nations and infrastructure. Some estimate that in 2016 malware attacks quadrupled from previous numbers. Learn about the increased threats for 2017 and get guidance on how to respond and react to malware using threat hunting.

Red Teams Advance In-Memory Evasion Tradecraft

Red Teams Advance In-Memory Evasion Tradecraft

In this two part post, we'll look at three of the latest techniques that have surfaced to thwart advanced memory scanning techniques, such as those used by Infocyte. In a follow-up post we'll talk about advances made by Infocyte to make scaled memory scanning more robust and difficult to counter.

African Cyber-security: Contradictory rankings as cyber-attacks continue

African Cyber-security: Contradictory rankings as cyber-attacks continue

Africa continues to be plagued by malware. Recently, countries such as Zambia, Uganda and Tanzania have regularly been in the top ten threat indexed countries, last year it was Angola, Namibia and Djibouti that tended to feature. Enterprises must take steps to combat malware proactively. One way to do that is to adopt a threat hunting platform, to buttress the defensive measures taken. 

Webinar: 3 Flaws with the Defense in Depth Security Model and How to Improve It

Webinar: 3 Flaws with the Defense in Depth Security Model and How to Improve It

Infocyte is partnering with Crowd Research Partners for a webinar on ‘The 3 Flaws with the Defense in Depth Security Model and How to Improve It’ on Thursday, July 20th at 2 pm ET. Cybersecurity experts explore why the current defense in depth model leaves critical gaps which allow attackers to remain undetected.

The data is in: The faster you hunt and contain breaches, the smaller the financial impact

The data is in: The faster you hunt and contain breaches, the smaller the financial impact

For the first time in a long time, the average data breach cost has declined 10% globally, according to the latest numbers from the Ponemon Institute’s 2017 Cost of Data Breach Study: Global Overview. The study also showed that how quickly an organization contained a data breach had a direct effect on the financial impact.

Top Challenges and Benefits to Building a Threat Hunting Program

Top Challenges and Benefits to Building a Threat Hunting Program

Threat hunting is gaining momentum in the industry as IT and security teams attempt to keep up with the constant barrage of new cyber threats and malware attacks. Organizations are quickly recognizing it is no longer enough to be reactive, but instead they must be proactive to stay ahead of hackers and those who look to steal data or wreak havoc on systems. While companies are increasingly acknowledging they need to adopt threat hunting practices, according to a recent survey published by the SANS Institute many are struggling to adapt.