The Infocyte Blog

cyber endpoints bkg

6 Tips on Finding Budget for New Cybersecurity Tools

Forbes recently reported that Gartner predicts IT security spending will grow to a whopping $70 billon by 2020. This prediction is supported by a Search Security survey of 2016 Information Security Spending showing 71% of respondents report increased spending, and financial giants including JPMC and Bank of America have recently stated they have unlimited security budgets. However the IT spending outlook isn’t so generous for everyone, 26% of those surveyed say their organization is flat on spending and 3% report decreased spending. 

Read More »
cyber endpoints bkg

Threat Hunting 101

The reality of today’s cybersecurity landscape is that, within a complex enterprise network, no amount of investment in security controls will stop every breach, nor will it stop a well-resourced and determined attacker from getting in if they want to.  This realization has pressed many organizations to expand beyond reactive intrusion detection systems and invest in a proactive new approach called threat hunting.

Read More »
cyber endpoints bkg

PowerShell Threat Hunting with Infocyte’s Chris Gerritz at BSides Las Vegas

In this videotaped session presented at BSides Las Vegas this August on PowerShell-Fu – Hunting on the Endpoint, CEO Chris Gerritz explores how to hunt for malware and compromises on Windows endpoints using built-in PowerShell commands and scripts.

Read More »
cyber endpoints bkg

Combating APTs – What cyber security teams aren’t doing…

If you were to come home to and find a broken window, what would you do? Would you simply get someone to patch up your window and then go about your day? If you’re like me, you would absolutely freak out – SOMEONE was in my house!!!

I would carefully go from room to room like I’m on SEAL Team 6, making sure that nobody is still in the house. This is because the greatest threat to my safety is the hidden intruder that may be still be cuddled up against winter jackets in the closet.

In the IT world, the absolute, number one vulnerability on your network is an ongoing compromise. Period. Let me repeat this – as a cyber security professional, there is no greater vulnerability to you, your career, and the success of your organization, than an ongoing compromise.

Read More »

HUNT Available on SEWP V and NETCENTS-2 Airforce and Federal Buying Contracts

Infocyte, a provider of agentless hunt technology that eradicates malware and persistent threats, announced that Infocyte HUNT is now available on the SEWP V and NETCENTS-2 buying contracts held by immixTechnology, Inc, a wholly owned subsidiary of immixGroup, Inc., and Arrow Electronics companyThese new contracts vehicles make it easier for federal agencies and the US Airforce to procure the Infocyte solution to hunt cyber threats.

Read More »
cyber endpoints bkg

Assessing Cybersecurity Risk in a Breached World

Network security and risk assessments are widely recognized as a key component of enterprise IT security. These assessments are used to measure and report on the health of the network and the risks associated with operating them to help answer the same question: “Can my network be hacked?” What they don’t answer is whether an adversary has used an identified weakness or vulnerability to gain unauthorized access to the network. Read on to learn about a new class of security assessment.

Read More »
cyber endpoints bkg

Breach Detection by the Numbers: Days, Weeks or Years?

The cyberattacks reported by the media continue to highlight a common thread – many of the breaches have gone undetected for weeks, months and sometimes years – take the recent Wendy’s breach for example. We call this the Breach Detection Gap (BDG) or dwell time, and it is defined as the time elapsed between the initial breach of a network by an attacker and the discovery of that breach by the victim. 

Read More »
cyber endpoints bkg

Chris Gerritz to Speak at BSides Las Vegas

August is set to be a busy month for Infocyte CEO Chris Gerritz as he travels around the US to speak at some noteworthy tech conferences to share how using threat hunting to find adversaries already on your network can be your best defense as hackers continue to penetrate our defenses. If you’re at one of these conferences be sure to sit in on Chris’ session to see how the latest techniques in threat hunting can benefit your security posture.

Read More »

The Wendy’s Breach–Closing the Window on Malware and Hidden Threats

Back in May Wendy’s announced they had been hit by a breach involving malware on the point of sale (POS) system. Originally thought to have impacted less than 300 of the fast-food chain’s locations, last week the company acknowledged that that breach was much worse than originally thought with 1,025 restaurants impacted. 

Read More »
cyber endpoints bkg

Discussing Changing the Mindset of Security Operations-IT Security Planet

I recently had the opportunity to become an IT Security Planet “Expert,” giving me the ability to share my opinion on information security news and trends with their audience of savvy security pros. In my first “Expert’s Corner” article, excerpted below, I share my thoughts on “Threat Hunting: Changing the Mindset of Security Operations.”

Read More »