Who “Wins” the MITRE ATT&CK Evaluations?

Last week, results were released for the fourth round of MITRE Engenuity ATT&CK Evaluations. There were 30 participating vendors this year. Cybereason achieved perfect scores in nearly every aspect of the MITRE ...
Infocyte Co-Founders Interview: Chris Gerritz's and Russ Morris's Background (Pt. 1 of 6)

Under the Hood of an MDR Company: an Exercise in Innovation [Video]

Running a successful EDR platform and MDR service is never-ending pursuit to stay one step ahead of hackers. As threat actors find creative ways to attempt to circumvent our customers defenses, we ...

EDR vs. MDR Services: Which is Right for You?

Cybersecurity is a topic that keeps many business executives, managers, and IT directors up at night, and with good reason. The average cost of a breach in 2021 is estimated at $4.24 ...
Leveraging the XDR Advantage in the Midst of a Pandemic

Leveraging the XDR Advantage in the Midst of a Pandemic

The pandemic has changed organizations’ technology priorities profoundly over the last two years. In a study reported on by Business Wire, cybersecurity and hybrid working constituted the top enterprise technology priorities looking ...
Which Data Do Ransomware Attackers Target for Double Extortion?

Which Data Do Ransomware Attackers Target for Double Extortion?

Double extortion is one of the most prevalent ransomware tactics today. The attackers first exfiltrate sensitive information from their target before launching the ransomware encryption routine. The threat actor then demands a ...
MDR Basics: Interview with Solutions Granted

Managed Detection and Response 101 [Video]

Cyberattacks are at an all-time high. Ransomware is all over the news, and killware is the next big fear. Hackers are growing more competent at detecting gaps and loopholes in corporate security ...
RansomOps: Detecting Complex Ransomware Operations

RansomOps: Detecting Complex Ransomware Operations

In a recent blog post we discussed how today’s more complex RansomOps attacks are more akin to stealthy APT-like operations than the old “spray and pray” mass email spam campaign of old, ...