Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

2/12/2018
08:50 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Infocyte Series B Funding and New CEO Fuel Expansion of Threat Hunting Platform

Capital and Seasoned Fortune 500 Executive Curtis Hutcheson to Drive Rapid Growth of the Infocyte HUNT Solution for Dedicated Threat Hunting and Compromise Assessments

SAN ANTONIO – Feb. 12, 2018 – Infocyte, the threat hunting leader, today announced the close of a $5.2 million Series B funding round and welcomed seasoned Fortune 500 technology executive Curtis Hutcheson as CEO. The round, which brings the cyber threat hunting company’s total investment to $8.6M, was led by Toba Capital with participation from existing investors LiveOak Venture Partners, and Feik Enterprises. New investment and leadership is expected to drive continued company growth and demand for its flagship dedicated threat hunting and Compromise Assessment platform, Infocyte HUNT™.

“Industry reports continue to show the damage that can be inflicted by an undetected breach in an enterprise network is actually growing rather than shrinking — and the risk extends beyond the business, to insurers and regulators. Infocyte’s unique approach to the problem enables both internal ‘hunt’ teams and independent assessors to quickly find threats hidden within a network. At Toba, we believe this is a key capability missing in the current enterprise security ecosystem, especially as regulation and accountability increase,” said Vinny Smith, founder of Toba Capital.

Threat hunting has rapidly become a hot topic for the security industry. Until now, this practice has been limited to the most sophisticated security professionals in the military and top tier financial institutions who often rely on manual and time-consuming techniques to sift through analytics and behavioral data.

Infocyte HUNT is a dedicated threat hunting platform built by former military threat hunters responsible for protecting the largest and most targeted networks in the world. It leverages military grade techniques and practices in an automated platform to simplify the hunt process, and reduce the skillset requirement for hunting malware and advanced persistent threats (APTs). When prevention and security controls fail, Infocyte HUNT significantly reduces attacker dwell time—the period between infection and discovery—to deny them the ability to persist undetected, reduce business impact, and restore trust in a network’s health.

Mark Grosvenor, CTO of global insurance broker NFP, said, “We have vetted multiple vendors and products over the years and Infocyte HUNT was the first product to truly deliver on its promise of being easy to use and deploy. It has enabled us to proactively search for malware faster and more efficiently across our entire network spanning thousands of nodes and multiple locations.”

Leading Infocyte’s market expansion of its threat hunting technology is new CEO, Curtis Hutcheson. He brings a growth-oriented leadership approach to Infocyte that he has cultivated during his 25+ year career in leading technology companies. Hutcheson was most recently General Manager for Dell Security Software (acquired by Francisco Partners), which included SonicWALL network security. Hutcheson also serves on the board of Interset.

“Infocyte continues to be a leader within the threat hunting community, especially with our proactive use of live, scalable volatile memory forensic techniques. Our intent has always been to greatly simplify the threat hunting process and empower practitioners with varying skill sets to effectively hunt without specialized expertise,” said Chris Gerritz, founder and chief product officer of Infocyte. “The additional capital and new leadership enables Infocyte to scale with the growing demand for Infocyte HUNT, as well as support our growing network of partners offering Compromise Assessments using Infocyte HUNT.”

 

About Infocyte, Inc.

Developed by former US Air Force cybersecurity officers, Infocyte’s dedicated forensics-based threat hunting platform discovers the post-compromise activity of cyber attackers and malware that have bypassed other defenses. The company’s unique approach to security reduces attacker dwell time to help organizations and independent assessors defend networks and critical information. For more information visit www.infocyte.com or follow @InfocyteInc.

 

About Toba Capital

Toba Capital is an investment firm committed to helping create incredible technology companies. Toba backs businesses capable of long-term growth and teams with the potential to fundamentally shift markets for the common good. The firm takes a high-conviction, hands-on, dollar-concentrated approach to venture investing, and is unafraid to get in the boat to help row. Toba Capital was founded in 2012 by Vinny Smith.

 

About LiveOak Venture Partners

LiveOak is a $109MM Fund based in Austin, TX and was founded by Ben Scott, Krishna Srinivasan, and Venu Shamapant (all formerly of Austin Ventures). While many of LiveOak’s investments begin in the early stages, LiveOak is a full lifecycle investor focused on technology and technology-driven service companies based in Texas. With over 16 years of successful early stage investing in Texas, the Founders of LiveOak have helped entrepreneurs create industry-leading companies, such as Spatial Wireless (acquired by Alcatel-Lucent), Navini Networks (acquired by Cisco Systems), LifeSize Technologies (acquired by Logitech) and Mavenir Systems (NYSE: MVNR), and StackEngine (Acquired by Oracle).

 

Media Contact:

Jessica Ann Morris, Public Relations                         

Phone: 781-608-0499                                                

Email: [email protected]             

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/17/2020
APT Groups Set Sights on Linux Targets: Inside the Trend
Kelly Sheridan, Staff Editor, Dark Reading,  9/11/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5605
PUBLISHED: 2020-09-18
Directory traversal vulnerability in WHR-G54S firmware 1.43 and earlier allows an attacker to access sensitive information such as setting values via unspecified vectors.
CVE-2020-5606
PUBLISHED: 2020-09-18
Cross-site scripting vulnerability in WHR-G54S firmware 1.43 and earlier allows remote attackers to inject arbitrary script via a specially crafted page.
CVE-2020-5628
PUBLISHED: 2020-09-18
UNIQLO App for Android versions 7.3.3 and earlier allows remote attackers to lead a user to access an arbitrary website via the vulnerable App. As a result, if the access destination is a malicious website, the user may fall victim to the social engineering attack.
CVE-2020-5629
PUBLISHED: 2020-09-18
UNIQLO App for Android versions 7.3.3 and earlier allows remote attackers to lead a user to access an arbitrary website via a malicious App created by the third party. As a result, if the access destination is a malicious website, the user may fall victim to the social engineering attack.
CVE-2020-25756
PUBLISHED: 2020-09-18
** DISPUTED ** A buffer overflow vulnerability exists in the mg_get_http_header function in Cesanta Mongoose 6.18 due to a lack of bounds checking. A crafted HTTP header can exploit this bug. NOTE: a committer has stated "this will not happen in practice."