Have your IPii&r & Respond too? IPii&r explained and why it is your new favorite information security acronym.
By Chris Auger Regardless of your company’s size, from an attacker’s perspective, you have financial resources or can be a conduit to another organization’s funds. Today’s average attack is often part of an advanced persistent threat (APT) that has been in a compromised environment for 200+ days. This is a ... Read More
First Hour Response: The Only Way to Handle an Event Prior to it Becoming an Incident
By Chris Mills In a recent blog post around Cobalt Strike, Chris Gerritz spoke about how important it was to be prepared and have a true partner in the first hour of a security event. In speaking with our team over the last few weeks, we agreed that this really ... Read More
Introducing Infocyte Real-Time Security: Continuous Threat Monitoring for Endpoints & Cloud
Infocyte has provided security service providers and customers with the most scalable cloud-based platform for responding to threats. It offers unique capabilities needed by threat hunters and responders such as agentless deployment, powerful memory analysis to find fileless threats, and extensible response actions. Today, we are announcing the release of ... Read More
Cyber Security Considerations for Protecting Remote Employee Devices and Remote Access Environments
With COVID-19 (Coronavirus) being declared a pandemic by the World Health Organization, many organizations have asked employees to work remotely and/or restrict travel. In addition, hackers are using this opportunity to step up their activity. As more employees shift to working from home it can be more difficult to enforce ... Read More
Partner Best Practices for Remote Incident Response and Assessment Service Delivery
In the past, Incident Responders and Security Analysts had to fly out to a network to help contain and investigate an incident on-site, or complete a Threat and Compromise Assessment. Even without coronavirus fears, this practice is becoming less and less popular. With COVID-19 (Coronavirus) being declared a pandemic by ... Read More
8 Key Capabilities Managed Security Service Providers Need from their Endpoint Detection and Response Platform
Endpoint devices represent a significant attack surface for most enterprises. Many businesses don’t have the resources or the expertise to thoroughly monitor their own endpoints and to promptly respond as needed when threats are detected. Their logical course of action is to outsource the full range of activities for endpoint ... Read More
Infocyte’s Chris Gerritz Appointed to Board of Non-Profit Merivis to Support Veteran Tech Transitions
Retired Air Force cybersecurity officer embraces Merivis vision of finding high-tech careers for former military personnel and their spouses. AUSTIN, Texas—Feb. 27, 2020—Chris Gerritz, Co-founder and CPO of Infocyte, has been appointed to the Board of Directors of Merivis, a non-profit organization that provides training for veterans and military spouses ... Read More
Video Q&A with Senior InfoSec Analyst Aaron Sherrill: Discussing MDR Security Services
We recently had the pleasure of connecting with 451 Research Senior Analyst in Information Security, Aaron Sherrill, for a video Q&A session. The topic of conversation was endpoint security — specifically, questions surrounding the rationale for investing in a Managed Detection and Response (MDR) security solution. MDR or Managed Detection ... Read More
How to Develop a Hybrid Cloud Security Strategy
Hybrid clouds integrate cloud computing with on-premise resources. In this ecosystem, environments are not only integrated, but also exchange networking resources and distribute traffic between them. The result should be high availability and scalability. However, since hybrid involves so many connections and endpoints, it can create blindspots in your security ... Read More
Adopting Zero Trust in IT: Five Steps When Building a Zero Trust IT Environment
Zero Trust is an approach to cybersecurity which means “never trust and always verify”—before access is granted. The idea of a Zero Trust IT environment is one in which data, endpoints, and systems are protected by limiting access to them. This relatively new way to think about cybersecurity is growing ... Read More

