Cybersecurity

Think Forward.

  • three cybersecurity trends

Three Cybersecurity Trends to Consider in the New Year

In this post: Learn about three cybersecurity trends to consider to keep your company's virtual assets safe in the new year.  Happy New Year from your partners at Adapture. Improving cybersecurity in your organization should be a lot more than simply a new year’s resolution—it should be an ongoing initiative that is constantly changing and evolving. We obviously [...]

2025-02-19T12:03:26-05:00December 29th, 2017|Cybersecurity, Security|
  • ransomware horror stories

Three Ransomware Horror Stories

In this post: Read about three scary ransomware horror stories and why they are still making headlines.  It’s Halloween—the perfect time to enjoy some spooky tales. If we’ve learned anything about the horror genre from Hollywood, it’s that the scariest and most compelling horror stories are often the ones that are based on true events. Though you may [...]

2017-10-31T13:05:47-04:00October 31st, 2017|Cybersecurity, Ransomware, Security|
  • security technology

A Comprehensive Approach to Security Technology

In this post: Learn about Adapture's approach to effective security technology that minimizes your company's vulnerabilities.  A recent study conducted by F5 Networks reveals that, while 60% consider security a “business priority,” only 51% of businesses actually have an established IT security strategy that spans the entire company. They lack security cohesion. As Adapture experts have warned before, [...]

2024-06-19T10:23:05-04:00September 7th, 2017|Cybersecurity, Security|
  • IT Security Management

Mitigating Cyberattacks through Effective IT Security Management Processes

In this post: Learn how to reduce the effect of cyberattacks on your organization through effective IT security management.  You just discovered some malware lurking in your infrastructure that’s been collecting data silently for the past six weeks. What now? If the next steps are not immediately clear, then perhaps you should revisit your company’s cybersecurity protocols. Despite [...]

2024-06-17T15:05:19-04:00August 18th, 2017|Cybersecurity, Security|
  • Intrusion Detection and Prevention Systems

Gartner’s 2017 “Leaders” in Intrusion Detection and Prevention Systems

ADAPTURE is an Authorized Trend Micro Partner Headquartered in Atlanta Continuing with our Gartner Magic Quadrant series, this post will review the “Leaders” of Intrusion Detection and Prevention Systems. In case you’re just joining the series, be sure to catch up on the other Magic Quadrants that we’ve highlighted: EPP, Enterprise Network Firewalls, IaaS, SIEM, SSA, Integrated Systems, WAF. This time, we [...]

2024-05-03T14:00:51-04:00August 15th, 2017|Cybersecurity, Security|
  • human factor

The Reality of Cloud Security Issues: The Human Factor

In this post: Learn how to strengthen the weakest point of your cloud security measures: the human factor.  No matter the software you have installed, the technology you own, or the protocols you have in place, cloud security breaches will usually happen at the weakest link in the chain. Unfortunately, the most common weakest link happens to be [...]

2017-08-10T08:32:52-04:00August 10th, 2017|Cloud, Cybersecurity, Security|
  • Enterprise Network Firewalls

Gartner’s 2017 “Leaders” in Enterprise Network Firewalls

ADAPTURE is an Authorized Palo Alto and Check Point Partner Headquartered in Atlanta Today, we will discuss another Gartner Magic Quadrant, and this one has some history to it.  Gartner has recently unified its Enterprise Firewall and Next Generation Firewall categories as vendors have incorporated the “next generation” features, like application and user control and intrusion prevention systems, [...]

2024-05-03T14:00:22-04:00August 1st, 2017|Cybersecurity, Security|
  • partner cylance

ADAPTURE Partner Cylance Among 2017 Gartner “Biggest Movers”

Adapture is an Authorized Cylance Partner Headquartered in Atlanta In this series, we will be highlighting those elite companies that have made it into the coveted quadrants of Gartner’s playing field, starting with the Endpoint Security market. But first, let’s lay some groundwork. When Gartner highlights you in a “Magic Quadrant,” you know that you’re one of the [...]

2024-06-20T10:41:36-04:00July 18th, 2017|Cybersecurity, Security|
  • endpoint security vendors

Ask the Experts: Evaluating Leading Endpoint Security Vendors

Advantages and Disadvantages of Three Top Endpoint Security Vendors By Tim Cullen, CISSP, F5-CTS and Jacob Hunt Security Architects at ADAPTURE Endpoint Protection (EPP) Security is a suite of software that is installed on laptops, desktops, and servers. The purpose is to prevent multiple types of malicious threats from infecting the local machine. These threats include malware, device [...]

2024-06-17T13:56:28-04:00July 16th, 2017|Cloud, Cybersecurity, Security|
  • Petya Ransomware

Petya Ransomware: Ask the Experts

Petya Ransomware: "Bigger Than WannaCry" The Petya ransomware attack began earlier today in Europe and is quickly spreading globally. We asked our experts for their thoughts on this latest attack. Elliott Abraham, CISSP, lamented, "There's no kill switch in Petya. It will most certainly be bigger than WannaCry." Senior Solutions Architect Jacob Hunt added, "The Petya strain has been [...]

2017-06-27T17:30:29-04:00June 27th, 2017|Cybersecurity, Ransomware, Security|
Go to Top