First Hour Response Blog Image

First Hour Response: The Only Way to Handle an Event Prior to it Becoming an Incident

noviembre 18, 2020

By Chris Mills In a recent blog post around Cobalt Strike, Chris Gerritz spoke about how important it was to be prepared and have a true partner in the first hour of a security event. In speaking with our team over the last few weeks, we agreed that this really put into concise words the…

Leer más "
cyber endpoints bkg

Simplifying O365 Security with Infocyte – Coming Fall 2020

octubre 20, 2020

By John Norden Microsoft Office 365 (O365) is the most popular SaaS productivity and back-office platform in the market today. O365 can be a very secure solution, but it must be configured properly and monitored for malicious activity and environmental changes (like configuration, mail forwarding, etc). Most  SMBs and many larger enterprises lack the knowledge…

Leer más "
New Infocyte Blog: Cobalt Strike

Cobalt Strike: The New Favorite Among Thieves

septiembre 2, 2020

By Chris Gerritz Since 2012, Cobalt Strike has been utilized as a proactive way of testing network defenses against advanced threat actor tools, tactics, and procedures (TTPs). The aim, of course, is to mimic the most malicious threat actors and their techniques to test your security posture and practice response procedures. Unfortunately, like most things…

Leer más "
cyber endpoints bkg

Infocyte Announces Click-to-Respond Enabling Remote and Distributed Workforces to Operate More Safely

agosto 27, 2020

By John Norden Respond to threats with a click. Yes, really. One of the challenges that every organization faces is scaling their security team. We hear about it all of the time–the skills gap, talent shortage, or whatever buzzword you’d like to use, the bottom line is–security teams are strapped.  With this in mind, last…

Leer más "
infocyte endpoint detection and response security

Introducing Infocyte Real-Time Security: Continuous Threat Monitoring for Endpoints & Cloud

abril 1, 2020

Infocyte has provided security service providers and customers with the most scalable cloud-based platform for responding to threats. It offers unique capabilities needed by threat hunters and responders such as agentless deployment, powerful memory analysis to find fileless threats, and extensible response actions. Today, we are announcing the release of our much requested real-time security…

Leer más "
protecting remote employees

Cyber Security Considerations for Protecting Remote Employee Devices and Remote Access Environments

marzo 18, 2020

With COVID-19 (Coronavirus) being declared a pandemic by the World Health Organization, many organizations have asked employees to work remotely and/or restrict travel. In addition, hackers are using this opportunity to step up their activity. As more employees shift to working from home it can be more difficult to enforce and maintain tight security controls.…

Leer más "
remote incident response services

Partner Best Practices for Remote Incident Response and Assessment Service Delivery

marzo 12, 2020

In the past, Incident Responders and Security Analysts had to fly out to a network to help contain and investigate an incident on-site, or complete a Threat and Compromise Assessment. Even without coronavirus fears, this practice is becoming less and less popular. With COVID-19 (Coronavirus) being declared a pandemic by the World Health Organization, many…

Leer más "
endpoint detection and response mssps

8 Key Capabilities Managed Security Service Providers Need from their Endpoint Detection and Response Platform

marzo 4, 2020

Endpoint devices represent a significant attack surface for most enterprises. Many businesses don’t have the resources or the expertise to thoroughly monitor their own endpoints and to promptly respond as needed when threats are detected. Their logical course of action is to outsource the full range of activities for endpoint threat detection and response to…

Leer más "
video qa with aaron sherrill

Video Q&A with Senior InfoSec Analyst Aaron Sherrill: Discussing MDR Security Services

febrero 25, 2020

We recently had the pleasure of connecting with 451 Research Senior Analyst in Information Security, Aaron Sherrill, for a video Q&A session. The topic of conversation was endpoint security — specifically, questions surrounding the rationale for investing in a Managed Detection and Response (MDR) security solution. MDR or Managed Detection and Response, is a managed…

Leer más "
hybrid cloud security

How to Develop a Hybrid Cloud Security Strategy

febrero 20, 2020

Hybrid clouds integrate cloud computing with on-premise resources. In this ecosystem, environments are not only integrated, but also exchange networking resources and distribute traffic between them. The result should be high availability and scalability. However, since hybrid involves so many connections and endpoints, it can create blindspots in your security perimeter.  In this article, you…

Leer más "