Cybersecurity

Think Forward.

  • cloudbleed

The Cloudbleed Incident: Finally, Some Good News

Written by Elliott Abraham, CISSP Senior Security Architect at ADAPTURE What is Cloudbleed? There is a serious new internet bug in the news, and it even has one of those sinister sounding names. This bug, dubbed “Cloudbleed” by the security researcher who discovered it, is named in part because of its similarity to the Heartbleed bug, which infected [...]

2017-03-01T10:45:46-05:00March 1st, 2017|Cloud, Cybersecurity, Security|
  • Penetration Testing

From the Experts: Network Penetration Testing Best Practices and the Related Challenges

Taking a Best-Practices Approach to Penetration Testing Written by: Elliott Abraham, CISSP - Senior Security Architect at Adapture Penetration Testing or, as it’s known somewhat euphemistically, PEN Testing is a vital component of an overall risk management program. PEN Testing is so vital and is taken so seriously that the Payment Card Industry (PCI) in March of 2015 published [...]

2024-06-19T10:07:10-04:00February 1st, 2017|Cybersecurity, Networking, Penetration Testing, Security|
  • IoT security

IoT Security, or Lack Thereof

This post was written by Mindy Affrime, guest contributor from Securolytics. While IoT devices (printers, DVRs, thermostats, smart appliances, etc.) make it possible for organizations of every size and in every sector to run more effectively and efficiently, they are too often added to a business' network without any regard to their security risk. Unfortunately for many manufacturers [...]

2017-01-31T13:31:01-05:00January 31st, 2017|Cybersecurity|
  • cybersecurity stories

Year in Review: The Top Cybersecurity Stories of 2016

From the massive data breach at Yahoo! to the constant coverage of Russia’s cyber campaign interfering in the U.S. election, 2016 was a year in which cybersecurity received constant mainstream coverage. Here’s a breakdown of the top cybersecurity stories of 2016, proving no information is safe from cyber-attackers: Wendy’s Breach Compromises Payment Cards Fast-food chain Wendy’s was impacted [...]

2024-06-19T10:15:57-04:00January 9th, 2017|Cloud, Cybersecurity, DDoS, Security|
  • Cisco PIX firewalls

#Infosec Alert: What the Shadow Broker 0-Day BenignCertain Means to You

Cisco PIX firewalls named along with other top-tier security devices in BenignCertain exploit from Shadow Brokers Written by: Elliott Abraham, Senior Security Consultant at ADAPTURE The central tenets of every information security program are intended to protect the Confidentiality, Integrity and Availability (CIA) of vital network resources. End users often entrust this critical responsibility to service providers, manufacturers, [...]

2016-08-22T10:04:51-04:00August 22nd, 2016|Cybersecurity, Security|
  • Ransomware

It’s Time to Get Serious About Ransomware

A Strong Business Continuity Plan Will Lessen the Threat  A recent email scam, claiming to be from energy company AGL, targeted 10,000 Australians, according to The Sydney Morning Herald. The email tricks a user into downloading a copy of a bill which then installs malware—known as ransomware—that locks a computer down and demands a sum of money in [...]

2016-06-15T14:29:43-04:00June 15th, 2016|Cloud, Cybersecurity, Security|
  • Annual Threat Report

What Dell’s Annual Threat Report Says About the State of Cybersecurity

What is Dell's Annual Threat Report? Dell recently released its Annual Threat Report, which collected data throughout 2015 using the company’s SonicWALL Global Response Intelligence Defense network. The network provides daily feeds from more than one million firewalls and tens of millions of connected endpoints, Dell SonicWALL traffic and other industry sources. The results paint a troubling picture: [...]

2016-05-18T11:42:44-04:00May 18th, 2016|Cloud, Cybersecurity, Security|
  • TAG Cybersecurity

ADAPTURE Consultants Facilitating Annual TAG Cybersecurity Simulation

Security architects will offer network security advice to businesses ADAPTURE security architects will present information on improving IT security and maintaining effective responses to cyberattacks during the annual Technology Association of Georgia Cybersecurity Simulation at Kennesaw State University on May 18. Ahmed Abdalla, Elliott Abraham and Cedric Caldwell will present vital security information on cyberattack prevention and recovery [...]

2016-03-30T10:32:34-04:00March 30th, 2016|Cybersecurity, News & Press|
  • University Cybersecurity

Ramping Up University Cybersecurity

Are Colleges and Universities Vulnerable to Cyberattacks? Colleges and universities are increasingly being targeted by cyber-attackers, including state-sponsored advanced persistent threat groups, who view these institutions as treasure troves of valuable information. Protecting the valuable data held at these schools will take a multi-tiered approach centered on incident response and proactive security. Schools are already under siege from [...]

2016-03-22T09:58:23-04:00March 22nd, 2016|Cybersecurity, Security|
  • DEFEATING THE CYBER KILL CHAIN

Defeating the Cyber Kill Chain

What is the Kill Chain? Cyber-attackers executing advanced threats against organizations utilize what’s known as the cyber kill chain. The kill chain is the “high-level framework or workflow that advanced threat actors employ in their efforts to compromise the target,” according to Dell SecureWorks. “Actors behind advanced threats have a toolbox of exploit techniques at their disposal,” says [...]

2016-02-10T11:08:47-05:00February 10th, 2016|Cybersecurity, Security|
Go to Top