Cybersecurity

Think Forward.

  • Multi-Factor Authentication

How Multi-Factor Authentication Protects Against Phishing Attacks

Written by Elliott Abraham, CISSP Senior Security Architect at ADAPTURE What is Authentication? Authentication is the means by which an entity validates that they are in fact who they claim to be. The most commonly used types of authentication are the very basic username and password. However, this presents a very real challenge for us. Our passwords are [...]

2017-06-19T09:49:47-04:00June 19th, 2017|Cybersecurity, Security|
  • Cylance’s security

The Cost Savings and Business Benefits of Deploying Cylance

A Summary of Forrester Consulting’s Research Findings Using Cylance’s security solutions reduces the risk of security breaches and improves IT and security employees’ productivity, according to a study conducted by Forrester Consulting. Advanced threat protection provider Cylance commissioned Forrester Consulting to conduct a Total Economic Impact study and examine the potential return on investment enterprises could realize by [...]

2017-03-21T11:00:16-04:00March 21st, 2017|Cybersecurity, Security|
  • cloudbleed

The Cloudbleed Incident: Finally, Some Good News

Written by Elliott Abraham, CISSP Senior Security Architect at ADAPTURE What is Cloudbleed? There is a serious new internet bug in the news, and it even has one of those sinister sounding names. This bug, dubbed “Cloudbleed” by the security researcher who discovered it, is named in part because of its similarity to the Heartbleed bug, which infected [...]

2017-03-01T10:45:46-05:00March 1st, 2017|Cloud, Cybersecurity, Security|
  • Penetration Testing

From the Experts: Network Penetration Testing Best Practices and the Related Challenges

Taking a Best-Practices Approach to Penetration Testing Written by: Elliott Abraham, CISSP - Senior Security Architect at Adapture Penetration Testing or, as it’s known somewhat euphemistically, PEN Testing is a vital component of an overall risk management program. PEN Testing is so vital and is taken so seriously that the Payment Card Industry (PCI) in March of 2015 published [...]

2025-02-21T09:26:16-05:00February 1st, 2017|Cybersecurity, Networking, Penetration Testing, Security|
  • IoT security

IoT Security, or Lack Thereof

This post was written by Mindy Affrime, guest contributor from Securolytics. While IoT devices (printers, DVRs, thermostats, smart appliances, etc.) make it possible for organizations of every size and in every sector to run more effectively and efficiently, they are too often added to a business' network without any regard to their security risk. Unfortunately for many manufacturers [...]

2017-01-31T13:31:01-05:00January 31st, 2017|Cybersecurity|
  • cybersecurity stories

Year in Review: The Top Cybersecurity Stories of 2016

From the massive data breach at Yahoo! to the constant coverage of Russia’s cyber campaign interfering in the U.S. election, 2016 was a year in which cybersecurity received constant mainstream coverage. Here’s a breakdown of the top cybersecurity stories of 2016, proving no information is safe from cyber-attackers: Wendy’s Breach Compromises Payment Cards Fast-food chain Wendy’s was impacted [...]

2024-06-19T10:15:57-04:00January 9th, 2017|Cloud, Cybersecurity, DDoS, Security|
  • Cisco PIX firewalls

#Infosec Alert: What the Shadow Broker 0-Day BenignCertain Means to You

Cisco PIX firewalls named along with other top-tier security devices in BenignCertain exploit from Shadow Brokers Written by: Elliott Abraham, Senior Security Consultant at ADAPTURE The central tenets of every information security program are intended to protect the Confidentiality, Integrity and Availability (CIA) of vital network resources. End users often entrust this critical responsibility to service providers, manufacturers, [...]

2016-08-22T10:04:51-04:00August 22nd, 2016|Cybersecurity, Security|
  • Ransomware

It’s Time to Get Serious About Ransomware

A Strong Business Continuity Plan Will Lessen the Threat  A recent email scam, claiming to be from energy company AGL, targeted 10,000 Australians, according to The Sydney Morning Herald. The email tricks a user into downloading a copy of a bill which then installs malware—known as ransomware—that locks a computer down and demands a sum of money in [...]

2016-06-15T14:29:43-04:00June 15th, 2016|Cloud, Cybersecurity, Security|
  • Annual Threat Report

What Dell’s Annual Threat Report Says About the State of Cybersecurity

What is Dell's Annual Threat Report? Dell recently released its Annual Threat Report, which collected data throughout 2015 using the company’s SonicWALL Global Response Intelligence Defense network. The network provides daily feeds from more than one million firewalls and tens of millions of connected endpoints, Dell SonicWALL traffic and other industry sources. The results paint a troubling picture: [...]

2016-05-18T11:42:44-04:00May 18th, 2016|Cloud, Cybersecurity, Security|
  • TAG Cybersecurity

ADAPTURE Consultants Facilitating Annual TAG Cybersecurity Simulation

Security architects will offer network security advice to businesses ADAPTURE security architects will present information on improving IT security and maintaining effective responses to cyberattacks during the annual Technology Association of Georgia Cybersecurity Simulation at Kennesaw State University on May 18. Ahmed Abdalla, Elliott Abraham and Cedric Caldwell will present vital security information on cyberattack prevention and recovery [...]

2025-02-19T12:11:48-05:00March 30th, 2016|Cybersecurity, News & Press|
Go to Top