Posts

Infocyte Microsoft 365 Security Module

Microsoft 365 Security for Extended Detection and Response

January 7, 2021

John Norden As I mentioned in a recent blog post, Infocyte is expanding it’s platform capabilities by launching a Microsoft 365 security module this week. We are especially excited for this module which will enhance our endpoint detection and response platform to provide detection, response, and compliance across your entire environment. Although Microsoft 365 has…

Read More »
Sunburst Malware Scanner Image

SUNBURST – Where We Are Now – 2021

January 6, 2021

Many of us spent the holidays hunting for Solarwinds backdoors. So where are we now? What did we learn? Whats left to be done? SUNBURST in 2021.

Read More »
cyber endpoints bkg

On-Demand Webinar: Hunting for Sunburst Compromises

December 21, 2020

Wednesday, December 23 Infocyte hosted a webinar with our Co-founder and Chief Product Officer, Chris Gerritz. Chris is a foremost expert in threat hunting and has done a significant amount of research around this recent backdoor and subsequent compromises. He’ll cover: Indicators to search for related to the vulnerable versions of SolarWinds Orion How to…

Read More »
Forrester Now Tech MDR Report

Forrester Now Tech: Managed Detection And Response Services Providers Report

December 17, 2020

Infocyte was recently recognized in Forrester’s Now Tech: Managed Detection and Response Services Providers, Q4 2020. This report showcases Infocyte as an easy path to implement endpoint detection and response (EDR) or managed detection and response (MDR) for mid-size organizations. This report highlights the importance of establishing threat hunting with managed detection and response as…

Read More »
cyber endpoints bkg

Hunting for SolarWinds Orion Compromises

December 14, 2020

Infocyte has published an official Infocyte extension which scans servers for all reported host-based indicators of compromise related to the Solarwinds Orion compromise.

Read More »

Mind The Gap: The Prevention Paradox

December 14, 2020

The concept of “The Prevention Paradox” describes how an increase in prevention can cause you to be less secure. If you are scratching your head right now, you are not alone. This seems counterintuitive on the surface. But let’s go a step further. By preventing every attack vector you can detect, you lose visibility on adversaries…

Read More »
cyber endpoints bkg

Have your Pii & Respond too? IPii&r explained and why it is your new favorite information security acronym.

December 1, 2020

By Chris Auger Regardless of your company’s size, from an attacker’s perspective, you have financial resources or can be a conduit to another organization’s funds. Today’s average attack is often part of an advanced persistent threat (APT) that has been in a compromised environment for 200+ days. This is a security risk which needs to…

Read More »
First Hour Response Blog Image

First Hour Response: The Only Way to Handle an Event Prior to it Becoming an Incident

November 18, 2020

By Chris Mills In a recent blog post around Cobalt Strike, Chris Gerritz spoke about how important it was to be prepared and have a true partner in the first hour of a security event. In speaking with our team over the last few weeks, we agreed that this really put into concise words the…

Read More »
Microsoft 365 Blog

Simplifying Microsoft 365 Security with Infocyte – Coming Fall 2020

October 20, 2020

By John Norden Microsoft 365 is the most popular SaaS productivity and back-office platform in the market today. Microsoft 365 can be a very secure solution, but it must be configured properly and monitored for malicious activity and environmental changes (like configuration, mail forwarding, etc). Most  SMBs and many larger enterprises lack the knowledge and…

Read More »
New Infocyte Blog: Cobalt Strike

Cobalt Strike: The New Favorite Among Thieves

September 2, 2020

By Chris Gerritz Since 2012, Cobalt Strike has been utilized as a proactive way of testing network defenses against advanced threat actor tools, tactics, and procedures (TTPs). The aim, of course, is to mimic the most malicious threat actors and their techniques to test your security posture and practice response procedures. Unfortunately, like most things…

Read More »