The Infocyte Blog

cybersecurity siem alert validation fatigue

Security Brief: SIEM Alert Validation and the Dangers of Alert Fatigue

Despite the rich data provided by SIEMs, organizations find themselves drowning in false positives, making it difficult to focus on high-priority events. This problem of alert fatigue prevents cyber security teams from identifying and addressing real threats – impacting small teams with no SOC, large enterprise teams with a SOC, and MSSPs overseeing the security for many SOCs/customers.

Read More »
malware higher education security brief

Security Brief: The Growing Threat of Malware in Higher Education

As malware, cybercrime, and attacks evolve they present a greater threat to private and public educational institutions, which are often underprepared to deal with cyber threats. Further, educational institutions and their computer networks are comprised of a high number of devices with relatively low standards related to security practices.

Read More »
africa threat malware cybersecurity

Security Brief: Africa, Technology And The Threat Of Malware

The rapid expansion of IT connectivity and businesses in Africa has led to the continent becoming a high value target for cyber-attacks of all kinds. This brief looks at the security challenges facing the region, as well as solutions to put proactive security practices in place to mitigate cyber threats in African countries.

Read More »
security operations center soc

Security Brief: Top Concerns Of Security Operations Centers (SOCs)

A recent Threat Hunting Report published by Crowd Research Partners indicated while 75% of respondents believe that threat hunting is of major importance, and 42% consider it a top priority, there are specific concerns that stand out. This security brief looks at the top 7 concerns of Security Operations Center (SOC) managers reported and shows how threat hunting with Infocyte HUNT helps to address these issues.

Read More »
security brief - cybersecurity implications gdpr

Security Brief: Uncovering A Major Hidden Risk Of GDPR Legislation

All companies in Europe today are focused on GDPR compliance. The smart ones are approaching the preparation for future compliance in a methodical and phased way, beginning with an assessment of the current data protection measures in place and identifying gaps or other threats to data security. What is alarming about the GDPR legislation, as it is written, are the hidden risks that will threaten companies that believe themselves compliant, but may unwittingly be missing the bar for compliance.

Read More »
financial markets cybersecurity

Security Brief: Protecting Financial Infrastructure From Cyber Threats

Banks, and indeed the entire global financial infrastructure, is something we rely on daily to keep economies moving and hold society together. The ever increasing volume and sophistication of financial malware attacks has led regulatory bodies to extend their purview to include cyber security and risk management practices and standards. Without question, it is in the public interest to keep banks and financial Market Infrastructures cyber secure using proactive security practices.

Read More »
cybersecurity retail pos cyber attacks

Security Brief: Protecting Retail Customers From POS Attacks

For the past several years, Point of Sale (POS) systems have been a prime target for cyberattacks. Last year, POS systems were besieged by hackers using malware such as LockPos/FlokiBot, MajikPOS, and JackPOS, to name a few. The reason is no mystery – POS systems are a key part of a retailer’s transaction process. They provide an access point through which cybercriminals can access and steal customers’ payment information, making them attractive targets for malicious hackers. Learn how to maintain the health of POS systems with routine compromise assessments.

Read More »