LATAM
August is set to be a busy month for Infocyte CEO Chris Gerritz as he travels around the US to speak at some noteworthy tech conferences to share how using threat hunting to find adversaries already on your network can be your best defense as hackers continue to penetrate our defenses. If you’re at one of these conferences be sure to sit in on Chris’ session to see how the latest techniques in threat hunting can benefit your security posture.
Read More »Back in May Wendy’s announced they had been hit by a breach involving malware on the point of sale (POS) system. Originally thought to have impacted less than 300 of the fast-food chain’s locations, last week the company acknowledged that that breach was much worse than originally thought with 1,025 restaurants impacted.
Read More »I recently had the opportunity to become an IT Security Planet “Expert,” giving me the ability to share my opinion on information security news and trends with their audience of savvy security pros. In my first “Expert’s Corner” article, excerpted below, I share my thoughts on “Threat Hunting: Changing the Mindset of Security Operations.”
Read More »Over the last few months we have been reading more and more about cyber-insurance policies. Leading insurance companies are underwriting coverages that address a wide array of cyber risks. However, a key area is omitted in their approach; breaches that may have already occurred.
Read More »Threat hunting has suddenly become a hot topic with recent articles in CSO and Dark Reading talking about it becoming a new trend, or as CSO suggests a fad. Truth is it’s a lot more than a fad – it can be your best chance of spotting and stopping a hidden attack before it causes catastrophic damage.
Read More »Last week was a big week for our company as we launched Version 2.0 of Infocyte HUNT. The big news, in case you missed it, is the new ability to scan Linux endpoints in addition to Windows, improvements to the malware analysis engine and user experience, and enhanced performance to consistently identify both active and dormant malware on an endpoint within minutes.
Since the news hit CEO Chris Gerritz has been busy speaking to the media and analysts about the new release and what it means for organizations trying to stay ahead of breaches involving malware and persistent threats. Here’s a quick summary of the industry coverage and links to the full articles.
Read More »Today we are happy to announce we released Infocyte HUNT™ v2.0. Customers may notice that our product has a new name as well as some exciting new features. Formerly called Pulse, Infocyte HUNT, our agentless threat hunting platform, now features the ability to scan Linux endpoints in addition to Windows, improvements to the malware analysis engine and user experience, and enhanced performance to consistently identify both active and dormant malware on an endpoint within minutes.
Read More »Welcome June! Thank goodness May is over based upon the number of breaches that took place during the month. While going through some industry articles over a rainy holiday weekend in the US, I came across a long list of breaches, 42 to be exact, that took place during the month of May 2016 as reported by ITGovenance.
Read More »I was speaking to someone on the phone and asked a pointed question: “Are your systems hacked?” There was a pause, which I broke by saying that it was a very black and white question. His reply? “We’ve never been hacked.” My response? “How do you know?”
Read More »Another day, another breach – and a long one at that for the latest FBI alert. The FBI quietly released threat intelligence indicators, including web-based attack infrastructure, on a grouped labeled “APT6”, which has been actively pilfering data from multiple government networks since at least 2011.
Read More »