The Infocyte Blog

cyber security compromise assessment

What is a Cyber Security Compromise Assessment and Why You Need One—Now

This post was last updated on November 12th, 2021 at 04:41 pmLet’s step away from thinking about infrastructures and networks in the usual context. Try not to think about your organization’s systems as just some combination of applications, servers, and digital connections that make everything work. Instead, think about your collective “systems” as an organism, a…

Read More »
check point infocyte partnership

Infocyte Partners With Check Point Software Technologies For Cloud-delivered Compromise Assessments, Proactive Threat Detection, Faster Incident Response

Infocyte, a cybersecurity company focused on proactive threat detection and incident response, and Check Point Software Technologies Ltd., a leading provider of cyber security solutions globally, are partnering to deliver faster threat detection and incident response services on compromised hosts. As part of the partnership Infocyte’s platform, Infocyte HUNT, will be integrated with Check Point’s suite of advanced services.

Read More »
cyber risk compromise assessment

Cyber Security Compromise Assessments vs Vulnerability Assessments

During the recent International Cyber Security and Intelligence Conference info security execs were lectured on the importance of being proactive vs reactive to stop cyberattacks. As part of a proactive strategy speaker Nik Alleyne, senior manager of cyber security at Forsythe Solutions Group, recommended vulnerability assessments and regular penetration tests. While these are important tools for evaluating cybersecurity risk, they only answer half of the security paradox; “Can I be hacked?” They do not answer the more vital question; “Am I already breached?”

Read More »
cyber endpoints bkg

The Role of Compromise Assessments in Enterprise Security

The role of intrusion detection is typically fulfilled by real-time intrusion detection systems and anti-virus software in conjunction with a continuous monitoring strategy. A compromise assessment differs from intrusion detection in that it is an active dedication of analytical resources with a focus on indicators of successful compromise. 

Read More »