Posts

africa threat malware cybersecurity

African Cyber-security: Contradictory rankings as cyber-attacks continue

Africa continues to be plagued by malware. Recently, countries such as Zambia, Uganda and Tanzania have regularly been in the top ten threat indexed countries, last year it was Angola, Namibia and Djibouti that tended to feature. Enterprises must take steps to combat malware proactively. One way to do that is to adopt a threat hunting platform, to buttress the defensive measures taken. 

Read More »
cyber endpoints bkg

3 Flaws with the Defense in Depth Security – Register

Infocyte is partnering with Crowd Research Partners for a webinar on ‘The 3 Flaws with the Defense in Depth Security Model and How to Improve It’ on Thursday, July 20th at 2 pm ET. Cybersecurity experts explore why the current defense in depth model leaves critical gaps which allow attackers to remain undetected.

Read More »
cyber endpoints bkg

The faster you hunt and contain breaches, the smaller the financial impact

For the first time in a long time, the average data breach cost has declined 10% globally, according to the latest numbers from the Ponemon Institute’s 2017 Cost of Data Breach Study: Global Overview. The study also showed that how quickly an organization contained a data breach had a direct effect on the financial impact.

Read More »
proactive cyber security threat hunting

Top Challenges and Benefits to Building a Threat Hunting Program

Threat hunting is gaining momentum in the industry as IT and security teams attempt to keep up with the constant barrage of new cyber threats and malware attacks. Organizations are quickly recognizing it is no longer enough to be reactive, but instead they must be proactive to stay ahead of hackers and those who look to steal data or wreak havoc on systems. While companies are increasingly acknowledging they need to adopt threat hunting practices, according to a recent survey published by the SANS Institute many are struggling to adapt. 

Read More »
cybersecurity compliance

Uncovering a Major Hidden Risk of GDPR Legislation

All companies in Europe today are focused on GDPR compliance. The smart ones are approaching the preparation for future compliance in a methodical and phased way, beginning with an assessment of the current data protection measures in place and identifying gaps or other threats to data security.

Read More »

Protecting the Enterprise in the Era of Malware-as-a-Service

The global WannaCry epidemic has brought malware to the forefront of every major news outlet and has every enterprise security team scrambling to either undo the damage or ensure that their systems are not compromised. The rise of Malware-as-a-service is fueling the attacks, and leaving enterprises wondering how do we better protect ourselves?

Read More »

4 Steps to Automating the Hunt for Cyber Threats

Learn the 4 key steps you need to put in place to get a threat hunting program jump started.

Read More »
cyber endpoints bkg

InterContinental Hotels Finds Malware in 1,175 Properties

Worldwide hotel group InterContinental Hotels, with brands including Holiday Inn Express, Holiday Inn, Candlewood Suites, Staybridge Suites, Crowne Plaza, Hotel Indigo, and Holiday Inn Resort, has reported an unwelcome guest in nearly one third of their 5,000 global properties: malware.

Read More »
cyber endpoints bkg

We’re Growing! Infocyte is adding to its Dev and QA teams

Infocyte is growing! We’re looking for talented individuals to join our growing team in San Antonio, Texas. We’re looking for a senior (10+ yr exp) software engineer and a junior (1-2 yr exp) QA and Support engineer.

Read More »
cyber endpoints bkg

SANS and Infocyte Detail a New DFIR-based Approach to Threat Hunting

Last week forensic expert Alissa Torres from the SANS Institute and Infocyte’s co-founder Chris Gerritz hosted a Webinar on Forensic State Analysis: A New Approach to Threat Hunting. In it they discussed how to adapt Digital Forensics & Incident Response (DFIR) techniques to scalably and proactively hunt for unknown threats across an entire enterprise network. If you missed the webinar here’s some highlights.

Read More »