Posts

cyber endpoints bkg

Scaling the Hunt for Fileless Malware

The recent explosion in mainstream attacks using “fileless” malware has left many organizations wondering how they can defend themselves. Infocyte has taken a unique approach to threat hunting that works by scanning key parts of volatile memory across thousands of systems at a time, making it possible to detect fileless malware at enterprise scale.

Read More »
cyber endpoints bkg

Infocyte Partners with the SANS Institute to Present Webinar

SANS is the most trusted and by far the largest source for information security training and security certification in the world, so we’re excited to co-host a Webinar with SANS analyst Alissa Torres on March 29th at 3:00pm EST. The webinar will focus on a new approach to Threat Hunting called Forensic State Analysis.

Read More »

RSAC 2017 Trends: The Endpoint Agent Convergence is Upon Us

RSAC is the industry mecca for security pros looking to keep up to speed with the trends in information security and companies showcasing their innovations. This year’s conference attracted over 43,000 attendees and featured two exhibition halls jampacked with hundreds of security vendors. Wandering the halls of RSAC this year, there was a lot of expected marketing hype and some compelling trends that emerged; some of them I saw coming… others, were surprising.

Read More »
cyber endpoints bkg

Threat Hunting Using Forensic State Analysis

Tonight, Infocyte will be attending the 2017 SC Magazine’s Awards Ceremony as a nominee for the Best Forensics Solution. It’s certainly an honor to be nominated for this award. But frankly, we’re a bit of an anomaly in this category. Let me explain. Unlike the other solutions, like Guidance Software’s Encase, Infocyte HUNT is not a pure forensics solution. On the contrary, what we have done is novel among commercial cybersecurity products. We have morphed endpoint digital forensics for proactive and scalable threat hunting (the search for unknown compromises/threats that have already bypassed other security controls).

Read More »
cyber endpoints bkg

Survey Says Threat Hunting on the Rise to Combat Wave of Cyber Threats

Crowd Research Partners today released the results of its 2017 Threat Hunting Report, revealing critical insights into the new practice of cyber threat hunting as an emerging line of defense to combat advanced cybersecurity threats.

Read More »
cyber endpoints bkg

SecurityNOW Podcast: Hacked and Don’t Know it with Chris Gerritz

Our CEO Chris Gerritz recently had the opportunity sit down with Preston Smith and Ken Hess of SecurityNOW to discuss how companies can actually be hacked and not know it in this podcast.

Read More »
cyber endpoints bkg

$3.4M in Series A Funding Paves the Way for Infocyte to Make Threat Hunting a Standard Enterprise Security Practice

I am very excited to share the news that Infocyte has closed a $3.4 million Series A funding round. This funding round enables Infocyte to accelerate adoption of the Infocyte HUNT platform, continue to stay ahead of an ever-changing threat landscape, and build more awareness for Infocyte’s disruptive approach to enterprise threat hunting. 

Read More »
cyber endpoints bkg

From All of Us at Infocyte May Your Holidays and New Year Shine

Happy Holidays from all of us at Infocyte It’s been an exciting year for us as we launched Infocyte HUNT, gaining industry recognition with a finalist nomination in the SC Media Awards for Best Computer Forensic Solution and a favorable review in Network World. We thank our customers, partners, and employees for supporting us and…

Read More »
forescout threat prevention

Network World – Top 3 Threat Hunting Products Infocyte HUNT Featured

Infocyte is honored to be reviewed in Network World as part of a lab review of the top 3 threat hunting products in the market. As threat hunting becomes the new standard in cybersecurity, Network World provides a detailed look at how Infocyte hunts for malware and APTs that have successfully compromised your network.

Read More »
cyber endpoints bkg

What Cyber Threats are Lurking on Your Network? Infocyte Answers in 3 Minutes

The breach detection gap – the time it takes from malware execution to discovery – is putting you at risk. In just 3 minutes learn how Infocyte HUNT allows you to proactively discover active or dormant malware and persistent threats that have successfully evaded existing defenses – all without a forensics specialist.

Read More »