cyber endpoints bkg

Breach Detection by the Numbers: Days, Weeks or Years?

July 26, 2016

The cyberattacks reported by the media continue to highlight a common thread – many of the breaches have gone undetected for weeks, months and sometimes years – take the recent Wendy’s breach for example. We call this the Breach Detection Gap (BDG) or dwell time, and it is defined as the time elapsed between the initial breach of a network by an attacker and the discovery of that breach by the victim. 

Read More »
cyber endpoints bkg

Chris Gerritz to Speak at BSides Las Vegas

July 20, 2016

August is set to be a busy month for Infocyte CEO Chris Gerritz as he travels around the US to speak at some noteworthy tech conferences to share how using threat hunting to find adversaries already on your network can be your best defense as hackers continue to penetrate our defenses. If you’re at one of these conferences be sure to sit in on Chris’ session to see how the latest techniques in threat hunting can benefit your security posture.

Read More »

The Wendy’s Breach–Closing the Window on Malware and Hidden Threats

July 13, 2016

Back in May Wendy’s announced they had been hit by a breach involving malware on the point of sale (POS) system. Originally thought to have impacted less than 300 of the fast-food chain’s locations, last week the company acknowledged that that breach was much worse than originally thought with 1,025 restaurants impacted. 

Read More »
cyber endpoints bkg

Discussing Changing the Mindset of Security Operations-IT Security Planet

July 6, 2016

I recently had the opportunity to become an IT Security Planet “Expert,” giving me the ability to share my opinion on information security news and trends with their audience of savvy security pros. In my first “Expert’s Corner” article, excerpted below, I share my thoughts on “Threat Hunting: Changing the Mindset of Security Operations.”

Read More »
interconnected hybrid host network

Are You Covered? Evaluating Risk for Cyber Insurers

June 29, 2016

Over the last few months we have been reading more and more about cyber-insurance policies.  Leading insurance companies are underwriting coverages that address a wide array of cyber risks. However, a key area is omitted in their approach; breaches that may have already occurred.

Read More »
cyber threat hunting server room

Threat Hunting: Fad or Essential Cyber Security Tactic?

June 17, 2016

Threat hunting has suddenly become a hot topic with recent articles in CSO and Dark Reading talking about it becoming a new trend, or as CSO suggests a fad. Truth is it’s a lot more than a fad – it can be your best chance of spotting and stopping a hidden attack before it causes catastrophic damage.

Read More »
network world threat hunting

Linux Threat Hunting with Infocyte HUNT News Roundup

June 15, 2016

Last week was a big week for our company as we launched Version 2.0 of Infocyte HUNT. The big news, in case you missed it, is the new ability to scan Linux endpoints in addition to Windows, improvements to the malware analysis engine and user experience, and enhanced performance to consistently identify both active and dormant malware on an endpoint within minutes.

Since the news hit CEO Chris Gerritz has been busy speaking to the media and analysts about the new release and what it means for organizations trying to stay ahead of breaches involving malware and persistent threats. Here’s a quick summary of the industry coverage and links to the full articles.

Read More »

Infocyte HUNT Agentless Threat Hunting Solution Includes Linux Platforms

June 9, 2016

Today we are happy to announce we released Infocyte HUNT™ v2.0. Customers may notice that our product has a new name as well as some exciting new features. Formerly called Pulse, Infocyte HUNT, our agentless threat hunting platform, now features the ability to scan Linux endpoints in addition to Windows, improvements to the malware analysis engine and user experience, and enhanced performance to consistently identify both active and dormant malware on an endpoint within minutes. 

Read More »

A Look at the Growing Number of 2016 Breaches and How to Stop Them

June 6, 2016

Welcome June! Thank goodness May is over based upon the number of breaches that took place during the month.  While going through some industry articles over a rainy holiday weekend in the US, I came across a long list of breaches, 42 to be exact, that took place during the month of May 2016 as reported by ITGovenance.

Read More »

Defense-in-Depth is Key to a Successful Security Strategy

May 31, 2016

I was speaking to someone on the phone and asked a pointed question: “Are your systems hacked?” There was a pause, which I broke by saying that it was a very black and white question. His reply? “We’ve never been hacked.” My response? “How do you know?”

Read More »