Posts

cyber endpoints bkg

Protecting Critical Infrastructure from Cyberattacks

March 16, 2018

Modern warfare is increasingly fought not with guns and bombs but with weaponized software. State-backed hackers in North Korea are currently setting their sights on critical infrastructure in the United States with the aim of knocking out power in the country, cybersecurity researchers have warned. Securing critical infrastructure is a priority for national security reasons, but the traditional view of security solely as a defensive measure is not enough to protect these systems; a proactive approach to security in tandem with defensive tools is best way forward to prevent catastrophe and keep people and commerce going.

Read More »
cyber endpoints bkg

Challenges of Threat Hunting with Endpoint Detection (EDR)

March 7, 2018

Last week in a Live Webinar we looked at the pitfalls of relying solely on Endpoint Detection (EDR) software for proactive threat hunting and examined some of the common misconceptions about the comprehensiveness of the data collected by many EDR solutions. The intention was not to discredit EDR or to say a forensic state analysis (FSA) approach is better, but to reflect on the different approaches to threat hunting which might be more appropriate for your use case. If you couldn’t join us here’s quick overview of what was covered.

Read More »
cyber endpoints bkg

Where to Hear Infocyte’s Chris Gerritz Talk Cybersecurity This Month

March 2, 2018

March is synonymous with college basketball tournaments. At Infocyte we have our own March Madness this month with a frenzy of speaking events. Here’s a list of where our very own expert threat hunter, Chris Gerritz, will be speaking this month on all things cybersecurity and threat hunting.

Read More »
cyber endpoints bkg

Highlights from Infocyte’s Cybersecurity Excellence Award

February 22, 2018

I’m pleased to announce we have been awarded a Silver 2018 Cybersecurity Excellence Product Award for Threat Hunting for our Infocyte HUNT threat hunting and compromise assessment platform. We are honored to be recognized by the Cybersecurity Excellence Awards and the Information Security Community with this award.

Read More »

Exciting Changes at Infocyte

February 13, 2018

Following up on yesterday’s announcement, I am thrilled to join Infocyte as the CEO. This is an exciting time for Infocyte. We just closed a Series B Round of funding that will allow us to more quickly scale our growth and meet the growing demand for Infocyte HUNT.

Read More »
cybersecurity profile

The Cyber Skills Shortage and the Need for Forensic Automation

February 8, 2018

Last year was a banner year for cybercrime. According to the Online Trust Alliance (OTA), the number of cybersecurity incidents nearly doubled from the previous year, with about 160,000 breaches reported. These events play out against a cyber risk landscape unrecognized outside of the security industry. A landscape bereft of sufficient professionals trained to handle such events.  In short, there is a growing shortage of skilled specialists in the cyber security domain, however, forensic automation provides a solution.

Read More »

If You Can Follow 4 Simple Steps, You Can Threat Hunt

February 1, 2018

By now you have heard of threat hunting and know that is something you should be doing as part of your security best practices. According to the 2017 Threat Hunting Report, understanding its importance and standing up a threat hunting program are not one in the same. If you are part of the 59% of organizations that acknowledge its importance but feel they lack the expert security staff to assist with threat mitigation – read on.

Read More »
cyber endpoints bkg

3 Challenges of Using Log Analysis for Threat Hunting

January 16, 2018

While there are many techniques that can be used to perform threat hunting, many turn to log analysis. Security analysts have spent countless hours trying to find the proverbial “needle in the haystack” by analyzing logs. Here are 3 of the challenges of using Log Analysis for threat hunting.

Read More »

Infocyte HUNT Nominated in the Cybersecurity Excellence Awards

January 11, 2018

We are pleased to announce that Infocyte HUNT is nominated for Best Threat Hunting Solution in the 2018 Cybersecurity Excellence Awards. Learn more and cast your vote before Jan 12th!

Read More »
2018 year of threat hunting

Security Predictions: 2018 the Year of Threat Hunting

January 4, 2018

January marks the time of year when security pros look at lesson learned from the previous year, and anticipate what threats to prepare for in the new year. We sat down with Infocyte’s Founder and seasoned threat hunter, Chris Gerritz, and our VP of Product, Rohit Dhamankar, to get their perspective on what challenges and new threats security pros should anticipate in 2018. They also offer advice on the proactive steps you can take to be ready for them.

Read More »