Resources

Find helpful White Papers, Security Briefs, Webinars, Case Studies, and Industry Reports related to cybersecurity, cyber threat hunting, and network and endpoint security.

White Papers

breach detection gap white paper

White Paper: The Breach Detection Gap And Strategies To Close It

This white paper examines why adversaries are successful in persisting in networks; the limitations of existing security technologies and methodologies to discover threats once they are inside; and how dedicated hunt technology and processes can work with your existing security infrastructure to deny attackers the ability to persist undetected.

Download White Paper »
cybersecurity financial sector white paper

White Paper: Cybersecurity in the Financial Sector

Banks and the financial services sector are under increasingly targeted cyberattacks. The industry faces unique threats and challenges, particularly custom designed malware. Old fashioned concepts of security and defense are outdated, what is required is a shift in mindset. Read our white paper :Cybersecurity in the Financial Sector” to learn more about updating your approach and securing your assets.

Download White Paper »
assessing cybersecurity risk compromise assessment white paper

White Paper: Assessing Cybersecurity Risk in a Breached World

This white paper introduces the role and need for the Compromise Assessment, a new class of security assessment which seeks to identify unknown security breaches and adversary presence within a network.  It also demonstrates how the latest threat hunting methodologies and technologies can be best applied to deliver a rapid and effective compromise assessment, giving information risk managers unparalleled fidelity and confidence into the status of their networks.

Download White Paper »

Security Briefs

africa threat malware cybersecurity

Security Brief: Africa, Technology And The Threat Of Malware

The rapid expansion of IT connectivity and businesses in Africa has led to the continent becoming a high value target for cyber-attacks of all kinds. This brief looks at the security challenges facing the region, as well as solutions to put proactive security practices in place to mitigate cyber threats in African countries.

Read Security Brief »
security operations center soc

Security Brief: Top Concerns Of Security Operations Centers (SOCs)

A recent Threat Hunting Report published by Crowd Research Partners indicated while 75% of respondents believe that threat hunting is of major importance, and 42% consider it a top priority, there are specific concerns that stand out. This security brief looks at the top 7 concerns of Security Operations Center (SOC) managers reported and shows how threat hunting with Infocyte HUNT helps to address these issues.

Read Security Brief »
security brief - cybersecurity implications gdpr

Security Brief: Uncovering A Major Hidden Risk Of GDPR Legislation

All companies in Europe today are focused on GDPR compliance. The smart ones are approaching the preparation for future compliance in a methodical and phased way, beginning with an assessment of the current data protection measures in place and identifying gaps or other threats to data security. What is alarming about the GDPR legislation, as it is written, are the hidden risks that will threaten companies that believe themselves compliant, but may unwittingly be missing the bar for compliance.

Read Security Brief »

Industry Reports

2018 threat hunting report

Industry Report: 2018 Threat Hunting Report

Crowd Research Partners 2018 Threat Hunting Report to gain critical insights into the new and growing practice of cybersecurity threat hunting as an emerging line of defense to combat advanced cybersecurity threats.

Download Full Report »
2017 threat hunting report

Industry Report: 2017 Threat Hunting Report

Crowd Research Partners 2017 Threat Hunting Report to gain critical insights into the new practice of cyber threat hunting as an emerging line of defense to combat advanced cybersecurity threats.

Download Full Report »

Webinars

Webinar: 3 Challenges of Threat Hunting Using Endpoint Detection (EDR) Tools

In this webinar, threat hunter Chris Gerritz looks at the pitfalls of relying on Endpoint Detection (EDR) software as a substitute for proactive threat hunting, and examine some of the common misconceptions. He will also show how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, big data or experts.

Download Full Report »

Webinar: 3 Challenges of Threat Hunting Using Log Analysis

This webinar provides an in-depth look at the challenges of using Log Analysis for threat hunting and examines some of the common misconceptions (i.e. you “can’t” hunt without logs and massive infrastructure investments are a prerequisite). It also shows how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, sensors, big data, and/or threat hunting experts.

Download Full Report »

Webinar: Forensic State Analysis – A New Approach to Threat Hunting

In this webinar, threat hunters from the SANS Institute and Infocyte discuss how to adapt Digital Forensics & Incident Response (DFIR) techniques to proactively hunt for unknown threats across an entire enterprise network — at scale. This approach is called Forensic State Analysis (FSA). Ultimately, FSA arms threat hunters with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, sensors, or big data.

Download Full Report »

Case Studies

Threat Hunting Case Studies
Insurance  NEW 

Leading Insurance Broker Recruits Infocyte For Automated Threat Hunting & Managed Incident Response

Watch 1-min Case Study  

Health & Medical  NEW 

Infocyte Partner Uses HUNT to Provide IR Assistance for Global Biotech Firm After Ryuk Ransomware Attack

Transportation & Logistics

Mass Transit Agency Uses HUNT to Assess Current Security Posture; Identifies and Patches Vulnerabilities

Banking & Financial

Infocyte MSSP Uses HUNT To Assess and Improve Banking Institution’s Cybersecurity Posture