Infocyte HUNT 3.0 Delivers Advanced Threat Hunting to Cyber Risk

cyber threat hunting blog

The number of long-term hacks being uncovered continues to rise unabated,

resulting in millions in financial losses, theft of intellectual property, and/or exposure of customer information. With the threat of undetected compromises and stealthy zero-day attacks breaking through even the best controls, cyber risk managers require more than what is being offered by legacy assessment solutions (which typically only address vulnerabilities or configuration management).

Infocyte was founded to help our customers combat the rise of persistent threats in their networks. With that mission, we are very excited to announce a new major release of our award winning threat hunting platform, Infocyte HUNT.  This 3.0 release expands on our foundation of threat hunting by bringing together capabilities to assess all three of the most important aspects of cybersecurity risk: vulnerabilities, assets, and threats.

To understand what’s missing, we have to go back to the basics:

What is a cyber risk?

cyber threat hunting risk Cyber risk is the intersection of threats, vulnerabilities, and assets.

At its’ most basic, Cyber Risk is a function of understanding the threats which exploit vulnerabilities to obtain, damage, or destroy assets.

  • An asset is what we’re trying to protect.
  • A vulnerability is a weakness or gap in our protection efforts.
  • A threat is what we’re trying to protect against (i.e. malicious software and/or actor).

The Next Generation of Risk Management

what is cyber risk Legacy risk management solutions only address a fraction of risk

Right now, your digital assets are exposed to a myriad of threats through vulnerabilities in software and network configurations. To understand true risk and state of the network, organizations need to adopt internal threat discovery capabilities to know what, if any, threats may have exploited an exposed vulnerability prior to mitigation.

Threat Hunting, or the proactive search for threats that may have bypassed your security controls, is the missing component. The future of cyber risk management requires threat hunting capabilities to be seamlessly integrated into the risk assessment process. Infocyte HUNT 3.0 delivers on that vision.

Infocyte HUNT 3.0 – New Features:

  • Discover and score over 100k application vulnerabilities (CVEs)
  • A modernized user interface to improve the threat hunting experience
  • Increased threat hunting capabilities
  • Expanded asset discovery and reporting to better understand exposures
  • New Threat Hunter Pro service offering on-demand access to Infocyte hunting experts

See Infocyte HUNT in Action. Request a Live Demo.

Request a Live Demo of Our Award-winning Threat Hunting and Incident Response Platform.

More from our blog

cybersecurity siem alert validation fatigue

Security Brief: SIEM Alert Validation and the Dangers of Alert Fatigue

March 27, 2019

Despite the rich data provided by SIEMs, organizations find themselves drowning in false positives, making it difficult to focus on high-priority events. This problem of alert fatigue prevents cyber security teams from identifying and addressing real threats – impacting small teams with no SOC, large enterprise teams with a SOC, and MSSPs overseeing the security for many SOCs/customers.

Read More »
2018 healthcare data breaches report

5 Takeaways From Reviewing 2018’s Healthcare Data Breaches

March 19, 2019

In 2018, the U.S. Healthcare Industry Remained a Hot Target for Data Breaches. Last year alone, over 15 million patient records were affected with an average of one data breach occurring every 24 hours in the healthcare industry. It goes without saying that hackers and cyber attackers are finding ways around/through/past security defenses—exploiting vulnerabilities and…

Read More »
hidden cyber attacks

Hunting, Detecting, and Responding to Hidden Threats Using FSA

March 12, 2019

A Brief History of Forensic State Analysis Prior to starting Infocyte, our co-founders, Chris Gerritz and Russ Morris, created the first enterprise-scoped threat hunting team for the entire U.S. Department of Defense. Their teams were responsible for hunting, detecting, and responding to highly sophisticated attacks across an 800,000-node network. With virtually unlimited resources and access…

Read More »