Infocyte Q2 2020 Newsletter

The New Work Environment In the past, to contain a security incident, your team had to be present at the devices. This requirement has been becoming less obtainable for quite some time ...
Introducing Infocyte Real-Time Security: Continuous Threat Monitoring for Endpoints & Cloud

Introducing Infocyte Real-Time Security: Continuous Threat Monitoring for Endpoints & Cloud

Infocyte has provided security service providers and customers with the most scalable cloud-based platform for responding to threats. It offers unique capabilities needed by threat hunters and responders such as agentless deployment, ...

The Bedrock of Security

Many organizations struggle with insecure access methods and unidentified processes. Integrating new, updated resources and technology can be an increasingly valuable commodity for any organization. But without building the foundation first, it ...

How to Advance ICS Cybersecurity: Implement Continuous Monitoring

Industrial Control Systems (ICS) include Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS) and other control system configurations such as Programmable Logic Controllers (PLC). They are typically used in ...

Continuous Monitoring : Academic Paper

The Federal Information Security Act (FISMA) of 2002 requires that government agencies report on their Information Technology Security Status annually to the Office of Management and Budget (OMB). [...] ...

Cloud Compliance for Financial Companies Requires a Merger of Three Disciplines

With weightier compliance penalties, ever-deepening cybercrime, and rapid adoption rates of public or hybrid cloud, financial services companies must pay closer attention to cloud compliance and stop treating it in a vacuum ...

How osquery helps secure your cloud with these two critical CIS Benchmark controls

Two of the 6 basic security controls, according to the Center for Internet Security, are focused on the current state of your assets. Assessing the state of your assets has been a ...

Cloud Workloads: Not the same ol’ endpoints

This may sound like common sense to developers, but securing the assets in your cloud requires you to recognize just how different a cloud workload is from a user asset. While the ...