Skip to content


false positives false negatives siem alerts

Cybersecurity 101: What You Need To Know About False Positives and False Negatives

February 16, 2019

An Overview of False Positives and False Negatives Understanding the differences between false positives and false negatives, and how they’re related to cybersecurity is important for anyone working in information security. Why? Investigating false positives is a waste of time/resources and distracts your team from focusing on real cyber incidents (alerts) originating from your SIEM.…

Read More »
cyber threat hunting healthcare

Three Use Cases For Proactive Threat Hunting and Detection Within Healthcare Organizations

February 8, 2019

Malware Hunting is a Necessity in Today’s Enterprise IT Environments Cyber attacks are evolving so rapidly that security teams are struggling to integrate and operationalize security tools that apply to only one area of the protection model. Malware Hunting (threat hunting) for example is becoming a necessity in today’s enterprise IT environments — especially for…

Read More »
infocyte cyber risk scoring

How Infocyte’s MDR Services Significantly Reduce Cyber Risk

February 1, 2019

Case Study: Building on our latest three blog posts in our series outlining how to manage and reduce your organization’s cyber risk, we wanted to show you how these principles (of reducing cyber risk) apply in a real-world case study. To do so, we’ll quickly drill down into detection and response capabilities that can reduce…

Read More »
cyber security incident response planning

Reducing Cyber Risk: 5 Tweaks to Your Incident Response Plan

January 22, 2019

According to a 2018 Ponemon Institute study of 2,800 IT and information security professionals, 77% claimed their organization lacked a formal cybersecurity incident response plan. In the first half of 2019, our Mid-market Threat and Incident Response Report found that small and mid-sized businesses can take up to six months (sometimes longer) to discover and…

Read More »
manage and reduce your cyber risk

Three Quick Ways To Manage and Reduce Your Cyber Risk

January 18, 2019

Manage your Cyber Risk Beyond the Core Protection There are plenty of ways to manage (and reduce) your cyber risk beyond the core protection and compliance investments. Here are the three methods of managing cyber risk we find most effective. 1. Detect and Patch Security Vulnerabilities Faster “Known vulnerabilities offer cyber-criminals an easy, relatively frictionless…

Read More »
nist cybersecurity framework

Managed Detection & Response (MDR): How Infocyte Eliminates Cyber Risk Within The NIST Framework

January 11, 2019

This blog is part two in our ROI series on reducing cyber risk and how Infocyte HUNT reduces your risk within the NIST framework. This post drills down into the managed detection and response (MDR) capabilities that can lower your overall risk and how Infocyte enables them for our partners and subscription customers. Based on…

Read More »
managing cybersecurity risk formula

Managing Cybersecurity Risk and a Framework for Making Investments

January 4, 2019

New Programs to Reduce your Cyber Risk Everyone agrees that core protection tools are necessary from a risk management and compliance standpoint, but what about adding new programs to reduce your cyber risk? Quantifying your cyber risk is difficult but necessary to establish a prudent financial evaluation and planning process that provides you the right…

Read More »
singapore financial cybersecurity capabilities grant

Singapore Invests $22 Million In Financial Sector With Cybersecurity Grant

December 27, 2018

Singapore Invests $22 Million To Reinforce Financial Sector Cybersecurity With  Capabilities Grant In December, the Monetary Authority of Singapore (MAS) launched the Cybersecurity Capabilities Grant. The Cybersecurity Capabilities Grant is a new cybersecurity funding initiative designed to help strengthen cyber resilience in Singapore’s financial sector. The $30 million (Singapore Dollars, roughly $22 million USD) government…

Read More »
2018 endpoint security risk

7 Takeaways From The 2018 ‘State of Endpoint Security Risk’ Report

October 31, 2018

As a rule, we avoid FUD—fear, uncertainty, and doubt—in our marketing. Cybersecurity is complex and confusing enough, so we prefer to focus on the facts without relying on scare tactics—yes, even on Halloween. That said, we also feel it’s important for people to understand their risks and what they’re up against. That way, you’re informed, you…

Read More »
cybersecurity voting election hacking

How Some States Are Taking Steps To Keep Election Hacking At Bay

October 26, 2018

Technology Created a Tradeoff of Efficiency for Security in Voting In the aftermath of the 2000 presidential election, amid the “hanging chads” fiasco in Florida upon which the election hinged, there was a tremendous effort to move toward voting automation to mitigate the perceived drawbacks of what was deemed antiquated paper ballots and/or mechanical/lever machine…

Read More »