cybersecurity voting election hacking

How Some States Are Taking Steps To Keep Election Hacking At Bay

October 26, 2018

Technology Created a Tradeoff of Efficiency for Security in Voting In the aftermath of the 2000 presidential election, amid the “hanging chads” fiasco in Florida upon which the election hinged, there was a tremendous effort to move toward voting automation to mitigate the perceived drawbacks of what was deemed antiquated paper ballots and/or mechanical/lever machine…

Read More »
threat hunting incident response idc

IDC Profiles Infocyte’s Managed Threat Hunting and Response Services

October 23, 2018

Market Intelligence Firm, IDC, Profiles Infocyte’s Managed Threat Hunting, and Lightweight Incident Response Services International Data Corporation (IDC) has 1,100+ analysts and provides market intelligence, advisory services, and professional events in the IT, telecom, and consumer tech markets in over 110 countries worldwide. IDC publishes “Vendor Profiles” to inform people (prospects, customers, and the general public)…

Read More »
cybersecurity internship program

Looking For A Cybersecurity Internship? Look No Further.

October 22, 2018

We Started our Cybersecurity Internship Program Starting a new career in cybersecurity can be overwhelming—especially if you lack hands-on experience. This is true for most people seeking a job in cybersecurity (a field with far more jobs than qualified candidates). We started our cybersecurity internship program for this very reason: to give professionals entering the…

Read More »
infocyte hunt platform 3.1

Infocyte HUNT 3.1 Release Notes

September 17, 2018

Infocyte HUNT version 3.1, Available for Upgrade While finalizing our major 3.0 release this summer, we met with several partners and customers to discuss design changes to our reporting in Infocyte HUNT. We wanted to understand how to best present the three core elements of Infocyte’s threat hunting platform: Threats, Vulnerabilities, and Assets (Hosts and Applications).…

Read More »
cyber endpoints bkg

Infocyte HUNT 3.0 Release Notes

July 18, 2018

HUNT 3.0 We are very excited to announce a new major release of our award-winning threat hunting software, Infocyte HUNT. This 3.0 release expands on our foundation of threat hunting by bringing together capabilities to assess all three of the most important aspects of cybersecurity risk: vulnerabilities, assets, and threats. Vulnerabilities Vulnerability scanning is a…

Read More »
cyber endpoints bkg

Infocyte HUNT 3.0 Delivers Advanced Threat Hunting to Cyber Risk

April 10, 2018

The number of long-term hacks being uncovered continues to rise unabated, resulting in millions in financial losses, theft of intellectual property, and/or exposure of customer information. With the threat of undetected compromises and stealthy zero-day attacks breaking through even the best controls, cyber risk managers require more than what is being offered by legacy assessment solutions (which typically only address vulnerabilities or configuration management).

Read More »
cybersecurity image

Cybersecurity Regulations – Looming Changes in the U.S.

March 28, 2018

We have all enjoyed the personalized experiences that software platforms are providing as they learn more about us, but with this data comes a high burden to protect it. We are seeing the implications of this manifested in broken trust with Facebook and Equifax. Cybersecurity and privacy standards are also confronting organizations today as they race to comply with the May deadlines of GDPR. What is the U.S. doing in parallel to keep up?

Read More »
cybersecurity retail pos cyber attacks

Protecting PoS systems in the wake of the latest breach at Applebee’s

March 23, 2018

Last week, Applebee’s announced it was the victim a Point of Sale (PoS) malware attack, warning customers in 15 states that their PII and credit card information was at risk. The attack is reported to have impacted 167 POS systems in the states of Alabama, Arizona, Florida, Illinois, Indiana, Kansas, Kentucky, Missouri, Mississippi, Nebraska, Ohio, Oklahoma, Pennsylvania, Texas, and Wyoming.

Read More »
cyber endpoints bkg

Protecting Critical Infrastructure from Cyberattacks

March 16, 2018

Modern warfare is increasingly fought not with guns and bombs but with weaponized software. State-backed hackers in North Korea are currently setting their sights on critical infrastructure in the United States with the aim of knocking out power in the country, cybersecurity researchers have warned. Securing critical infrastructure is a priority for national security reasons, but the traditional view of security solely as a defensive measure is not enough to protect these systems; a proactive approach to security in tandem with defensive tools is best way forward to prevent catastrophe and keep people and commerce going.

Read More »
cyber endpoints bkg

Challenges of Threat Hunting with Endpoint Detection (EDR)

March 7, 2018

Last week in a Live Webinar we looked at the pitfalls of relying solely on Endpoint Detection (EDR) software for proactive threat hunting and examined some of the common misconceptions about the comprehensiveness of the data collected by many EDR solutions. The intention was not to discredit EDR or to say a forensic state analysis (FSA) approach is better, but to reflect on the different approaches to threat hunting which might be more appropriate for your use case. If you couldn’t join us here’s quick overview of what was covered.

Read More »