Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

2/12/2018
08:50 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Infocyte Series B Funding and New CEO Fuel Expansion of Threat Hunting Platform

Capital and Seasoned Fortune 500 Executive Curtis Hutcheson to Drive Rapid Growth of the Infocyte HUNT Solution for Dedicated Threat Hunting and Compromise Assessments

SAN ANTONIO – Feb. 12, 2018 – Infocyte, the threat hunting leader, today announced the close of a $5.2 million Series B funding round and welcomed seasoned Fortune 500 technology executive Curtis Hutcheson as CEO. The round, which brings the cyber threat hunting company’s total investment to $8.6M, was led by Toba Capital with participation from existing investors LiveOak Venture Partners, and Feik Enterprises. New investment and leadership is expected to drive continued company growth and demand for its flagship dedicated threat hunting and Compromise Assessment platform, Infocyte HUNT™.

“Industry reports continue to show the damage that can be inflicted by an undetected breach in an enterprise network is actually growing rather than shrinking — and the risk extends beyond the business, to insurers and regulators. Infocyte’s unique approach to the problem enables both internal ‘hunt’ teams and independent assessors to quickly find threats hidden within a network. At Toba, we believe this is a key capability missing in the current enterprise security ecosystem, especially as regulation and accountability increase,” said Vinny Smith, founder of Toba Capital.

Threat hunting has rapidly become a hot topic for the security industry. Until now, this practice has been limited to the most sophisticated security professionals in the military and top tier financial institutions who often rely on manual and time-consuming techniques to sift through analytics and behavioral data.

Infocyte HUNT is a dedicated threat hunting platform built by former military threat hunters responsible for protecting the largest and most targeted networks in the world. It leverages military grade techniques and practices in an automated platform to simplify the hunt process, and reduce the skillset requirement for hunting malware and advanced persistent threats (APTs). When prevention and security controls fail, Infocyte HUNT significantly reduces attacker dwell time—the period between infection and discovery—to deny them the ability to persist undetected, reduce business impact, and restore trust in a network’s health.

Mark Grosvenor, CTO of global insurance broker NFP, said, “We have vetted multiple vendors and products over the years and Infocyte HUNT was the first product to truly deliver on its promise of being easy to use and deploy. It has enabled us to proactively search for malware faster and more efficiently across our entire network spanning thousands of nodes and multiple locations.”

Leading Infocyte’s market expansion of its threat hunting technology is new CEO, Curtis Hutcheson. He brings a growth-oriented leadership approach to Infocyte that he has cultivated during his 25+ year career in leading technology companies. Hutcheson was most recently General Manager for Dell Security Software (acquired by Francisco Partners), which included SonicWALL network security. Hutcheson also serves on the board of Interset.

“Infocyte continues to be a leader within the threat hunting community, especially with our proactive use of live, scalable volatile memory forensic techniques. Our intent has always been to greatly simplify the threat hunting process and empower practitioners with varying skill sets to effectively hunt without specialized expertise,” said Chris Gerritz, founder and chief product officer of Infocyte. “The additional capital and new leadership enables Infocyte to scale with the growing demand for Infocyte HUNT, as well as support our growing network of partners offering Compromise Assessments using Infocyte HUNT.”

 

About Infocyte, Inc.

Developed by former US Air Force cybersecurity officers, Infocyte’s dedicated forensics-based threat hunting platform discovers the post-compromise activity of cyber attackers and malware that have bypassed other defenses. The company’s unique approach to security reduces attacker dwell time to help organizations and independent assessors defend networks and critical information. For more information visit www.infocyte.com or follow @InfocyteInc.

 

About Toba Capital

Toba Capital is an investment firm committed to helping create incredible technology companies. Toba backs businesses capable of long-term growth and teams with the potential to fundamentally shift markets for the common good. The firm takes a high-conviction, hands-on, dollar-concentrated approach to venture investing, and is unafraid to get in the boat to help row. Toba Capital was founded in 2012 by Vinny Smith.

 

About LiveOak Venture Partners

LiveOak is a $109MM Fund based in Austin, TX and was founded by Ben Scott, Krishna Srinivasan, and Venu Shamapant (all formerly of Austin Ventures). While many of LiveOak’s investments begin in the early stages, LiveOak is a full lifecycle investor focused on technology and technology-driven service companies based in Texas. With over 16 years of successful early stage investing in Texas, the Founders of LiveOak have helped entrepreneurs create industry-leading companies, such as Spatial Wireless (acquired by Alcatel-Lucent), Navini Networks (acquired by Cisco Systems), LifeSize Technologies (acquired by Logitech) and Mavenir Systems (NYSE: MVNR), and StackEngine (Acquired by Oracle).

 

Media Contact:

Jessica Ann Morris, Public Relations                         

Phone: 781-608-0499                                                

Email: [email protected]             

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
When It Comes To Security Tools, More Isn't More
Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
IoT Vendor Ubiquiti Suffers Data Breach
Dark Reading Staff 1/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3166
PUBLISHED: 2021-01-18
An issue was discovered on ASUS DSL-N14U-B1 1.1.2.3_805 devices. An attacker can upload arbitrary file content as a firmware update when the filename Settings_DSL-N14U-B1.trx is used. Once this file is loaded, shutdown measures on a wide range of services are triggered as if it were a real update, r...
CVE-2020-29446
PUBLISHED: 2021-01-18
Affected versions of Atlassian Fisheye & Crucible allow remote attackers to browse local files via an Insecure Direct Object References (IDOR) vulnerability in the WEB-INF directory. The affected versions are before version 4.8.5.
CVE-2020-15864
PUBLISHED: 2021-01-17
An issue was discovered in Quali CloudShell 9.3. An XSS vulnerability in the login page allows an attacker to craft a URL, with a constructor.constructor substring in the username field, that executes a payload when the user visits the /Account/Login page.
CVE-2021-3113
PUBLISHED: 2021-01-17
Netsia SEBA+ through 0.16.1 build 70-e669dcd7 allows remote attackers to discover session cookies via a direct /session/list/allActiveSession request. For example, the attacker can discover the admin's cookie if the admin account happens to be logged in when the allActiveSession request occurs, and ...
CVE-2020-25533
PUBLISHED: 2021-01-15
An issue was discovered in Malwarebytes before 4.0 on macOS. A malicious application was able to perform a privileged action within the Malwarebytes launch daemon. The privileged service improperly validated XPC connections by relying on the PID instead of the audit token. An attacker can construct ...