The Infocyte Blog

cyber endpoints bkg

Infocyte’s Chris Gerritz Appointed to Board of Non-Profit Merivis to Support Veteran Tech Transitions

This post was last updated on July 17th, 2020 at 10:29 amRetired Air Force cybersecurity officer embraces Merivis vision of finding high-tech careers for former military personnel and their spouses. AUSTIN, Texas—Feb. 27, 2020—Chris Gerritz, Co-founder and CPO of Infocyte, has been appointed to the Board of Directors of Merivis, a non-profit organization that provides…

Read More »
video qa with aaron sherrill

Video Q&A with Senior InfoSec Analyst Aaron Sherrill: Discussing MDR Security Services

This post was last updated on August 27th, 2021 at 05:39 pmWe recently had the pleasure of connecting with 451 Research Senior Analyst in Information Security, Aaron Sherrill, for a video Q&A session. The topic of conversation was endpoint security — specifically, questions surrounding the rationale for investing in a Managed Detection and Response (MDR)…

Read More »
hybrid cloud security

How to Develop a Hybrid Cloud Security Strategy

This post was last updated on August 10th, 2021 at 05:58 pmHybrid clouds integrate cloud computing with on-premise resources. In this ecosystem, environments are not only integrated, but also exchange networking resources and distribute traffic between them. The result should be high availability and scalability. However, since hybrid involves so many connections and endpoints, it…

Read More »
zero trust it environment

Adopting Zero Trust in IT: Five Steps When Building a Zero Trust IT Environment

This post was last updated on August 10th, 2021 at 05:58 pmZero Trust is an approach to cybersecurity which means “never trust and always verify”—before access is granted. The idea of a Zero Trust IT environment is one in which data, endpoints, and systems are protected by limiting access to them. This relatively new way…

Read More »
election hacking 2020 vote

How Infocyte is Helping Prevent Election Hacking in Texas with Election Security Assessments

This post was last updated on August 27th, 2021 at 05:26 pmProtecting our elections and voting systems from cyber attack is a top priority for every state and local government. Leaders across the country are taking steps to reduce the threat of election tampering and election hacking. With the 2020 U.S. Presidential Election on the…

Read More »
edr software security tools

10 Considerations Before Buying an Endpoint Detection and Response (EDR) Security Solution – Part 2

This post was last updated on October 21st, 2021 at 02:14 pmIn part one of our blog about considerations before purchasing an endpoint detection and response (EDR) security tools or solution, we outlined four key factors: Agent vs. agentless monitoring What EDR systems can’t monitor Running an EDR in your cloud Integrating EDRs with other…

Read More »
endpoint detection response edr security

10 Considerations Before Buying an Endpoint Detection and Response (EDR) Security Solution – Part 1

This post was last updated on October 21st, 2021 at 02:14 pmThis is part one of a two-part blog series exploring important considerations when purchasing an endpoint detection and response (EDR) security solution or EDR tool for your organization. Increasingly, enterprise organizations consider EDR security solutions to be a critical component to help ensure overall…

Read More »
2019 end of year

2019 in Review and What’s Next for Infocyte

This post was last updated on August 10th, 2021 at 05:58 pmIn 2019, we made several significant improvements to our product, delivery model, and service offerings. In other words, a lot has changed. However, our primary goal has always remained the same: Enable cybersecurity professionals to easily hunt, detect, and respond to threats their prevention…

Read More »
cyber security compromise assessment

What is a Cyber Security Compromise Assessment and Why You Need One—Now

This post was last updated on November 12th, 2021 at 04:41 pmLet’s step away from thinking about infrastructures and networks in the usual context. Try not to think about your organization’s systems as just some combination of applications, servers, and digital connections that make everything work. Instead, think about your collective “systems” as an organism, a…

Read More »
cloud security threats

The Most Common Cloud Security Threats and How to Avoid Them

This post was last updated on August 10th, 2021 at 05:58 pmIn their eighth annual State of the Cloud Survey of the latest cloud computing trends, RightScale found 91% of survey respondents have workloads in the public cloud. What’s more, addressing the public cloud is a top priority for 31% of enterprises that were surveyed.…

Read More »