Infocyte HUNT Agentless Threat Hunting Solution Includes Linux Platforms

Today we are happy to announce we released Infocyte HUNT™ v2.0. Customers may notice that our product has a new name as well as some exciting new features. Formerly called Pulse, Infocyte HUNT, our agentless threat hunting platform, now features the ability to scan Linux endpoints in addition to Windows, improvements to the malware analysis engine and user experience, and enhanced performance to consistently identify both active and dormant malware on an endpoint within minutes. 

Read More »

A Look at the Growing Number of 2016 Breaches and How to Stop Them

Welcome June! Thank goodness May is over based upon the number of breaches that took place during the month.  While going through some industry articles over a rainy holiday weekend in the US, I came across a long list of breaches, 42 to be exact, that took place during the month of May 2016 as reported by ITGovenance.

Read More »

Defense-in-Depth is Key to a Successful Security Strategy

I was speaking to someone on the phone and asked a pointed question: “Are your systems hacked?” There was a pause, which I broke by saying that it was a very black and white question. His reply? “We’ve never been hacked.” My response? “How do you know?”

Read More »
cyber endpoints bkg

Another Day, Another Breach – Regaining Control of Your Network

Another day, another breach – and a long one at that for the latest FBI alert.  The FBI quietly released threat intelligence indicators, including web-based attack infrastructure, on a grouped labeled “APT6”, which has been actively pilfering data from multiple government networks since at least 2011.

Read More »