How are you monitoring host data today? Insane Cyber goes beyond traditional network monitoring. In this quick explainer, see how we combine host-level data with network visibility to deliver complete context and faster detection for OT environments. Whether you're a CISO, analyst, or engineer, this is how full-spectrum visibility starts. #OTSecurity #ICS #CyberSecurity #IndustrialSecurity #NetworkVisibility #IncidentResponse
Insane Cyber
Computer and Network Security
San Antonio, Texas 3,003 followers
Empowering rapid detection, response and recovery for critical infrastructure through forensic automation.
About us
As threat actors become more sophisticated, the tools we use to thwart them need to advance. At Insane Cyber, we've developed a powerful, automated solution monitoring host and network data - giving you instant near-insights and visibility into your network. Whether you have a mature cyber team and are looking to add to your tools, or you're just starting out we'll engage how you need us. Our Valkyrie Automated Security platform can be used in-house or with our Corvus xMDR service we'll monitor and respond for you.
- Website
-
https://insanecyber.com/
External link for Insane Cyber
- Industry
- Computer and Network Security
- Company size
- 11-50 employees
- Headquarters
- San Antonio, Texas
- Type
- Privately Held
- Founded
- 2020
- Specialties
- infosec, digital forensics, threat hunting, forensics, and cyber security
Locations
-
Primary
4 Dominion Dr
STE 5200 (Building 5, Suite 200)
San Antonio, Texas 78257, US
Employees at Insane Cyber
Updates
-
𝗗𝗮𝘆 𝟮𝟵 𝗼𝗳 𝟭𝟬𝟬 𝗗𝗮𝘆𝘀 𝗼𝗳 𝗢𝗧 𝗖𝘆𝗯𝗲𝗿 – 𝗘𝗳𝗳𝗲𝗰𝘁𝗶𝘃𝗲 𝗕𝗮𝘀𝗲𝗹𝗶𝗻𝗲𝘀 Baselines aren’t “set and forget.” They need to evolve as your environment changes. An effective baseline helps you separate the signal from the noise, spotting true threats without alert fatigue. Get it wrong, and you’re blind. Get it right, and you’re ready. #alertfatigue #threats #otcyber #baselines #baselining
-
Hacktivists. Nation-states. Fundamentals that still work. Mike Holcomb and Dan Gunter sat down to unpack the real OT threat landscape—where the noise of high-volume/low-impact attacks distracts from the quiet but dangerous low-volume/high-impact threats. 💡 Key takeaways: Why “I just want you off the network” is still the attacker’s mindset The OT security BASICS that can dramatically strengthen defense: 🔹 Backups 🔹 Asset Management 🔹 Secure Infrastructure 🔹 Incident Response 🔹 Continuous Vulnerability Management 🎥 Watch the full session here: https://loom.ly/a7TnUQw #OTCybersecurity #CriticalInfrastructure #OfficeHours
OT Office Hours | Hacktivists, Nation-States & OT Security Fundamentals | Mike Holcomb
https://www.youtube.com/
-
When TRISIS tried to take over safety systems, when Colonial Pipeline was disrupted, when Volt Typhoon blended into legitimate traffic—these weren’t just network problems. 𝗧𝗵𝗲𝘆 𝘄𝗲𝗿𝗲 𝗵𝗼𝘀𝘁-𝗹𝗲𝘃𝗲𝗹 𝗮𝘁𝘁𝗮𝗰𝗸𝘀. And yet, most utilities still rely almost entirely on network monitoring. That’s like watching hallway cameras while leaving the control rooms unguarded. In our new blog, we unpack why host data is the missing half of OT security—and how closing that gap is the key to resilience.
-
𝗗𝗮𝘆 𝟮𝟳 𝗼𝗳 𝟭𝟬𝟬 𝗗𝗮𝘆𝘀 𝗼𝗳 𝗢𝗧 𝗖𝘆𝗯𝗲𝗿 – 𝗦𝗽𝗼𝘁𝘁𝗶𝗻𝗴 𝗘𝗻𝗴𝗶𝗻𝗲𝗲𝗿𝗶𝗻𝗴 𝗪𝗼𝗿𝗸𝘀𝘁𝗮𝘁𝗶𝗼𝗻𝘀 Engineering workstations are the crown jewels of OT. Find them, and you find where the real power lies. But spotting them isn’t always obvious—they can look like any other box on the network. Today we show you how to identify them before attackers do. #crownjewels #engineer #workstation #network #attackers
-
𝗗𝗮𝘆 𝟮𝟲 𝗼𝗳 𝟭𝟬𝟬 𝗗𝗮𝘆𝘀 𝗼𝗳 𝗢𝗧 𝗖𝘆𝗯𝗲𝗿 – 𝗧𝗵𝗲 𝗣𝗼𝘄𝗲𝗿 𝗼𝗳 𝗣𝗮𝘀𝘀𝗶𝘃𝗲 𝗠𝗼𝗻𝗶𝘁𝗼𝗿𝗶𝗻𝗴 Active scanning in OT? Risky business. Passive monitoring lets you see what’s happening across your network—without disrupting production. It’s how you spot hidden devices, unusual chatter, and unsafe behavior. Less noise, more insight. #monitoring #network #passive #behavior #otcybersecurity
-
Remember the WannaCry attack that crippled over 230,000 computers worldwide in 2017? While it's a part of history, the lessons it taught about threat hunting are more critical than ever. The attack's devastating speed was powered by the EternalBlue exploit, which targeted a core Windows protocol, SMB. Detecting a threat like this requires moving beyond simple file hashes and digging into the network traffic itself. Our latest tech talk deep dives shows how to apply these timeless techniques to modern threat hunting and strengthen your security posture. Read the full analysis here: https://loom.ly/3EiXvQI #Cybersecurity #ThreatHunting #WannaCry #IncidentResponse #Ransomware #EternalBlue
-
-
𝗗𝗮𝘆 𝟮𝟱 𝗼𝗳 #𝟭𝟬𝟬𝗗𝗮𝘆𝘀𝗢𝗳𝗢𝗧𝗖𝘆𝗯𝗲𝗿 The Full Picture with Host and Network Data in OT Network data shows us who’s talking. Host data shows us what they’re saying. Together, host + network data give defenders the full picture of OT environments—revealing context, intent, and impact that one source alone can’t provide. It’s not network or host. It’s network and host. #network #data #environments #defender #otcyber
-
𝗗𝗮𝘆 𝟮𝟰 𝗼𝗳 #𝟭𝟬𝟬𝗗𝗮𝘆𝘀𝗢𝗳𝗢𝗧𝗖𝘆𝗯𝗲𝗿 Fingerprinting Industrial Devices Every industrial device leaves a trace—a “fingerprint.” By looking at protocol behavior, communication patterns, and device responses, we can identify what’s really out there in an OT environment. Device fingerprinting helps defenders detect rogue equipment, spot misconfigurations, and baseline “normal.” Without it, you’re flying blind. Have you ever found something unexpected on your OT network? #industrial #protocol #communication #defender