Blog

open source software vulnerabilities

7 Risks Posed by Open-Source Software and How to Defend Yourself

June 18, 2019

What is Open-source Software? Many businesses and products, 90% by some estimates, use at least one open-source component—even if they aren’t aware of it. Open-source software is software whose code is available for public inspection, modification, and enhancement. Typically, this software is created through community collaboration and is maintained and updated on a volunteer basis.…

Read More »
infocyte hunt mdr platform updates

New Features: Email Alerts, In-app Chat Support, and More

June 7, 2019

We continually strive to update and develop new features for Infocyte HUNT based on customer and partner feedback, as well as the changes in the threat landscape. Here is a brief breakdown of some changes we’ve implemented this quarter. Key New Features In-app Chat SupportThe Help button now opens a chat support window, connecting you…

Read More »
managed detection and response platform

Infocyte’s Automation and Managed Detection and Response (MDR) Security Services Ease the Need for Skilled Cybersecurity Experts

May 9, 2019

The cybersecurity job shortage is well documented. In a recent survey of IT decision makers by the Center for Strategic and International Studies, 82% of employers report experiencing a shortage of cybersecurity skills. Sadly, 71% believe this talent gap causes direct and measurable damage to the organizations. Read the full Cybersecurity Workforce Gap report, here.…

Read More »
phishing cyber attacks

Cybersecurity 101: Intro to the Top 10 Common Types of Cyber Security Attacks

May 1, 2019

Cyber attacks are increasingly common nowadays, and according to the Cisco Annual Cybersecurity Report, attackers can launch campaigns without human intervention with the advent of network-based ransomware worms. The number of security events increased in number and in complexity. A cyber attack is when an individual or an organization deliberately and maliciously attempts to breach…

Read More »
risk management process planning

Eliminating Uncertainty in your Cybersecurity Strategy Through Risk Management Planning

April 24, 2019

In this guest post from Reciprocity Labs we discuss the importance of having a comprehensive strategy when it comes to cybersecurity. It begins early in your risk planning processes by identifying where your vulnerabilities and liabilities are in your infrastructure and continues for the length of your company’s life through regular auditing and implementation of…

Read More »
2018 healthcare data breaches report

5 Takeaways From Reviewing 2018’s Healthcare Data Breaches

March 19, 2019

In 2018, the U.S. Healthcare Industry Remained a Hot Target for Data Breaches. Last year alone, over 15 million patient records were affected with an average of one data breach occurring every 24 hours in the healthcare industry. It goes without saying that hackers and cyber attackers are finding ways around/through/past security defenses—exploiting vulnerabilities and…

Read More »
hidden cyber attacks

Hunting, Detecting, and Responding to Hidden Threats Using FSA

March 12, 2019

A Brief History of Forensic State Analysis Prior to starting Infocyte, our co-founders, Chris Gerritz and Russ Morris, created the first enterprise-scoped threat hunting team for the entire U.S. Department of Defense. Their teams were responsible for hunting, detecting, and responding to highly sophisticated attacks across an 800,000-node network. With virtually unlimited resources and access…

Read More »
root cause analysis tools activity trace

Root Cause Analysis: Finding Patient Zero During a Cyber Security Incident

February 21, 2019

Our New Root Cause Analysis Tool is Designed to Help IR Teams Trace the Source of Suspicious Activity In Q1, we released new tools to assist cybersecurity incident responders. One of those new features is a root cause analysis tool, is designed to help IR teams trace the source of suspicious activity or identified threats…

Read More »
false positives false negatives siem alerts

Cybersecurity 101: What You Need To Know About False Positives and False Negatives

February 16, 2019

An Overview of False Positives and False Negatives Understanding the differences between false positives and false negatives, and how they’re related to cybersecurity is important for anyone working in information security. Why? Investigating false positives is a waste of time/resources and distracts your team from focusing on real cyber incidents (alerts) originating from your SIEM.…

Read More »
cyber threat hunting healthcare

Three Use Cases For Proactive Threat Hunting and Detection Within Healthcare Organizations

February 8, 2019

Malware Hunting is a Necessity in Today’s Enterprise IT Environments Cyber attacks are evolving so rapidly that security teams are struggling to integrate and operationalize security tools that apply to only one area of the protection model. Malware Hunting (threat hunting) for example is becoming a necessity in today’s enterprise IT environments — especially for…

Read More »