Blogs

Read our blog articles and let yourself be inspired!

Cyber Security Assessment Tool

Get serious about information security with the CSAT

Russian interference in the American elections, the WannaCry-virus in May and the Petya-virus just one month later. Information security is hitting the headlines more than ever. With European GDPR regulations taking effect on the 25th of May 2018, interest in this subject is bound to increase. Many organisations are worried about their security position as all these factors start to affect them. Doing nothing is not an option, but where do you start? Well, step one is knowing what the current state of your information security is. We can help you do that – in just one week. And once you know what your current position is, you can start making improvements. In this blog, I’ll explain what our approach is.

Infocyte HUNT

Hunt for malware with Infocyte HUNT

It takes on average 169 days to discover a malware breach. During that period, the attackers are inside your system and can do anything they like. This breach detection gap – the time between contamination and discovery – represents a serious risk to companies. In this blog we introduce Infocyte HUNT: a practical solution which assumes that systems have been breached and proactively searches for malware.