The Infocyte Blog

election hacking 2020 vote

How Infocyte is Helping Prevent Election Hacking in Texas with Election Security Assessments

This post was last updated on August 27th, 2021 at 05:26 pmProtecting our elections and voting systems from cyber attack is a top priority for every state and local government. Leaders across the country are taking steps to reduce the threat of election tampering and election hacking. With the 2020 U.S. Presidential Election on the…

Read More »
edr software security tools

10 Considerations Before Buying an Endpoint Detection and Response (EDR) Security Solution – Part 2

This post was last updated on October 21st, 2021 at 02:14 pmIn part one of our blog about considerations before purchasing an endpoint detection and response (EDR) security tools or solution, we outlined four key factors: Agent vs. agentless monitoring What EDR systems can’t monitor Running an EDR in your cloud Integrating EDRs with other…

Read More »
endpoint detection response edr security

10 Considerations Before Buying an Endpoint Detection and Response (EDR) Security Solution – Part 1

This post was last updated on October 21st, 2021 at 02:14 pmThis is part one of a two-part blog series exploring important considerations when purchasing an endpoint detection and response (EDR) security solution or EDR tool for your organization. Increasingly, enterprise organizations consider EDR security solutions to be a critical component to help ensure overall…

Read More »
2019 end of year

2019 in Review and What’s Next for Infocyte

This post was last updated on August 10th, 2021 at 05:58 pmIn 2019, we made several significant improvements to our product, delivery model, and service offerings. In other words, a lot has changed. However, our primary goal has always remained the same: Enable cybersecurity professionals to easily hunt, detect, and respond to threats their prevention…

Read More »
cyber security compromise assessment

What is a Cyber Security Compromise Assessment and Why You Need One—Now

This post was last updated on November 12th, 2021 at 04:41 pmLet’s step away from thinking about infrastructures and networks in the usual context. Try not to think about your organization’s systems as just some combination of applications, servers, and digital connections that make everything work. Instead, think about your collective “systems” as an organism, a…

Read More »
cloud security threats

The Most Common Cloud Security Threats and How to Avoid Them

This post was last updated on August 10th, 2021 at 05:58 pmIn their eighth annual State of the Cloud Survey of the latest cloud computing trends, RightScale found 91% of survey respondents have workloads in the public cloud. What’s more, addressing the public cloud is a top priority for 31% of enterprises that were surveyed.…

Read More »
fileless malware detection

Why Traditional Endpoint Detection and Response (EDR) Platforms Can’t Detect File-less Malware

This post was last updated on August 10th, 2021 at 05:58 pmFile-less malware is an extremely difficult-to-detect type of cyber threat and creates a serious problem for modern businesses, even more than ransomware. File-less malware requires no physical payload and creates no discernible or permanent footprint on the targeted machine(s). Instead, file-less threats can compromise…

Read More »
teamwork meeting

Best Practices for Preventing, Detecting, and Responding to Cyber Attacks [2021 Update]

This post was last updated on November 24th, 2021 at 12:28 pmPreventing cyber attacks is a top security concern for most organizations in 2021, and with good reason. Attacks are growing steadily in size and sophistication, and ransomware has disrupted daily life for many of us this year. The Colonial Pipeline ransomware incident was just…

Read More »
devsecops

DevSecOps in the Cloud: Creating Policy as Code Pipelines

This post was last updated on August 10th, 2021 at 05:59 pmOrganizations are increasingly adopting a DevSecOps mindset to help them meet the demands of perilous cybersecurity threat landscape. What this means is that security is brought to the forefront of the software development process and incorporated into every phase of the code pipeline. By…

Read More »
cyber security incident response checklist

Incident Response Planning: A Checklist for Building Your Cyber Security Incident Response Plan

This post was last updated on October 21st, 2021 at 11:40 amIs your organization prepared to respond to a security breach or cyber attack? According to many security experts, it’s a matter of “when” and not “if” your company will experience a serious cybersecurity incident. An incident response plan is your best chance at defending…

Read More »