CYBER SECURITY BLOG

Welcome to Infocyte's blog — featuring company news, product updates, cybersecurity best practices, threat hunting and incident response insights, and more.
2018 healthcare data breaches report

5 Takeaways From Reviewing 2018’s Healthcare Data Breaches

March 19, 2019

In 2018, the U.S. Healthcare Industry Remained a Hot Target for Data Breaches. Last year alone, over 15 million patient records were affected with an average of one data breach occurring every 24 hours in the healthcare industry. It goes without saying that hackers and cyber attackers are finding ways around/through/past security defenses—exploiting vulnerabilities and…

Read More
hidden cyber attacks

Hunting, Detecting, and Responding to Hidden Threats Using FSA

March 12, 2019

A Brief History of Forensic State Analysis Prior to starting Infocyte, our co-founders, Chris Gerritz and Russ Morris, created the first enterprise-scoped threat hunting team for the entire U.S. Department of Defense. Their teams were responsible for hunting, detecting, and responding to highly sophisticated attacks across an 800,000-node network. With virtually unlimited resources and access…

Read More
root cause analysis tools activity trace

Root Cause Analysis: Finding Patient Zero During a Cyber security Incident

February 21, 2019

Our New Root Cause Analysis Tool is Designed to Help IR Teams Trace the Source of Suspicious Activity In Q1, we released new tools to assist cybersecurity incident responders. One of those new features is a root cause analysis tool, is designed to help IR teams trace the source of suspicious activity or identified threats…

Read More
false positives false negatives siem alerts

Cybersecurity 101: What You Need To Know About False Positives

February 16, 2019

… and False Negatives An Overview of False Positives and False Negatives Understanding the differences between false positives and false negatives, and how they’re related to cybersecurity is important for anyone working in information security. Why? Investigating false positives is a waste of time/resources and distracts your team from focusing on real cyber incidents (alerts)…

Read More
cyber threat hunting healthcare

Three Use Cases For Proactive Threat Hunting and Detection Within Healthcare Organizations

February 8, 2019

Malware Hunting is a Necessity in Today’s Enterprise IT Environments Cyber attacks are evolving so rapidly that security teams are struggling to integrate and operationalize security tools that apply to only one area of the protection model. Malware Hunting (threat hunting) for example is becoming a necessity in today’s enterprise IT environments — especially for…

Read More
infocyte cyber risk scoring

How Infocyte’s MDR Services Significantly Reduce Cyber Risk

February 1, 2019

Case Study: Building on our latest three blog posts in our series outlining how to manage and reduce your organization’s cyber risk, we wanted to show you how these principles (of reducing cyber risk) apply in a real-world case study. To do so, we’ll quickly drill down into detection and response capabilities that can reduce…

Read More
cyber security incident response planning

Reducing Cyber Risk: 5 Tweaks to Your Incident Response Plan

January 22, 2019

An Incident Response Plan is a Crucial Set of Instructions Designed to help your IT department—security team at larger companies—properly deal with the slew of network security incidents that can hamper your business at any given moment. Such incidents include (but are not limited to) ransomware, data breaches, service outages, and cyber crimes such as…

Read More
manage and reduce your cyber risk

Three Quick Ways To Manage and Reduce Your Cyber Risk

January 18, 2019

Manage your Cyber Risk Beyond the Core Protection There are plenty of ways to manage (and reduce) your cyber risk beyond the core protection and compliance investments. Here are the three methods of managing cyber risk we find most effective. 1. Detect and Patch Security Vulnerabilities Faster “Known vulnerabilities offer cyber-criminals an easy, relatively frictionless…

Read More
nist cybersecurity framework

Managed Detection & Response (MDR)

January 11, 2019

How Infocyte Eliminates Cyber Risk Within The NIST Framework This blog is part two in our ROI series on reducing cyber risk and how Infocyte HUNT reduces your risk within the NIST framework. This post drills down into the managed detection and response (MDR) capabilities that can lower your overall risk and how Infocyte enables…

Read More