CYBER SECURITY BLOG

Welcome to Infocyte's blog — featuring company news, product updates, cybersecurity best practices, threat hunting and incident response insights, and more.
managing cybersecurity risk formula

Managing Cybersecurity Risk and a Framework for Making Investments

January 4, 2019

New Programs to Reduce your Cyber Risk Everyone agrees that core protection tools are necessary from a risk management and compliance standpoint, but what about adding new programs to reduce your cyber risk? Quantifying your cyber risk is difficult but necessary to establish a prudent financial evaluation and planning process that provides you the right…

Read More
singapore financial cybersecurity capabilities grant

Singapore Invests $22 Million In Financial Sector With Cybersecurity Grant

December 27, 2018

Singapore Invests $22 Million To Reinforce Financial Sector Cybersecurity With Cybersecurity Capabilities Grant In December, the Monetary Authority of Singapore (MAS) launched the Cybersecurity Capabilities Grant. The Cybersecurity Capabilities Grant is a new cybersecurity funding initiative designed to help strengthen cyber resilience in Singapore’s financial sector. The $30 million (Singapore Dollars, roughly $22 million USD)…

Read More
2018 endpoint security risk

7 Takeaways From The 2018 ‘State of Endpoint Security Risk’ Report

October 31, 2018

As a Rule, we Avoid Fear, Uncertainty, and Doubt in our Marketing Cybersecurity is complex and confusing enough, so we prefer to focus on the facts without relying on scare tactics—yes, even on Halloween. That said, we also feel it’s important for people to understand their risks and what they’re up against. That way, you’re informed,…

Read More
cybersecurity voting election hacking

How Some States Are Taking Steps To Keep Election Hacking At Bay

October 26, 2018

Technology Created a Tradeoff of Efficiency for Security in Voting In the aftermath of the 2000 presidential election, amid the “hanging chads” fiasco in Florida upon which the election hinged, there was a tremendous effort to move toward voting automation to mitigate the perceived drawbacks of what was deemed antiquated paper ballots and/or mechanical/lever machine…

Read More
threat hunting incident response idc

IDC Profiles Infocyte’s Managed Threat Hunting and Response Services

October 23, 2018

Market Intelligence Firm, IDC, Profiles Infocyte’s Managed Threat Hunting, and Lightweight Incident Response Services International Data Corporation (IDC) has 1,100+ analysts and provides market intelligence, advisory services, and professional events in the IT, telecom, and consumer tech markets in over 110 countries worldwide. IDC publishes “Vendor Profiles” to inform people (prospects, customers, and the general public)…

Read More
cybersecurity internship program

Looking For A Cybersecurity Internship? Look No Further.

October 22, 2018

We Started our Cybersecurity Internship Program Starting a new career in cybersecurity can be overwhelming—especially if you lack hands-on experience. This is true for most people seeking a job in cybersecurity (a field with far more jobs than qualified candidates). We started our cybersecurity internship program for this very reason: to give professionals entering the…

Read More
infocyte hunt platform 3.1

Infocyte HUNT 3.1 Release Notes

September 17, 2018

Infocyte HUNT version 3.1, Available for Upgrade While finalizing our major 3.0 release this summer, we met with several partners and customers to discuss design changes to our reporting in Infocyte HUNT. We wanted to understand how to best present the three core elements of Infocyte’s threat hunting platform: Threats, Vulnerabilities, and Assets (Hosts and Applications).…

Read More

Infocyte HUNT 3.0 Release Notes

July 18, 2018

HUNT 3.0 We are very excited to announce a new major release of our award-winning threat hunting software, Infocyte HUNT. This 3.0 release expands on our foundation of threat hunting by bringing together capabilities to assess all three of the most important aspects of cybersecurity risk: vulnerabilities, assets, and threats. Vulnerabilities Vulnerability scanning is a…

Read More

Infocyte HUNT 3.0 Delivers Advanced Threat Hunting to Cyber Risk

April 10, 2018

The number of long-term hacks being uncovered continues to rise unabated, resulting in millions in financial losses, theft of intellectual property, and/or exposure of customer information. With the threat of undetected compromises and stealthy zero-day attacks breaking through even the best controls, cyber risk managers require more than what is being offered by legacy assessment solutions (which typically only address vulnerabilities or configuration management).

Read More