Cybersecurity

Think Forward.

  • Cisco PIX firewalls

#Infosec Alert: What the Shadow Broker 0-Day BenignCertain Means to You

Cisco PIX firewalls named along with other top-tier security devices in BenignCertain exploit from Shadow Brokers Written by: Elliott Abraham, Senior Security Consultant at ADAPTURE The central tenets of every information security program are intended to protect the Confidentiality, Integrity and Availability (CIA) of vital network resources. End users often entrust this critical responsibility to service providers, manufacturers, [...]

2016-08-22T10:04:51-04:00August 22nd, 2016|Cybersecurity, Security|
  • Ransomware

It’s Time to Get Serious About Ransomware

A Strong Business Continuity Plan Will Lessen the Threat  A recent email scam, claiming to be from energy company AGL, targeted 10,000 Australians, according to The Sydney Morning Herald. The email tricks a user into downloading a copy of a bill which then installs malware—known as ransomware—that locks a computer down and demands a sum of money in [...]

2016-06-15T14:29:43-04:00June 15th, 2016|Cloud, Cybersecurity, Security|
  • Annual Threat Report

What Dell’s Annual Threat Report Says About the State of Cybersecurity

What is Dell's Annual Threat Report? Dell recently released its Annual Threat Report, which collected data throughout 2015 using the company’s SonicWALL Global Response Intelligence Defense network. The network provides daily feeds from more than one million firewalls and tens of millions of connected endpoints, Dell SonicWALL traffic and other industry sources. The results paint a troubling picture: [...]

2016-05-18T11:42:44-04:00May 18th, 2016|Cloud, Cybersecurity, Security|
  • TAG Cybersecurity

ADAPTURE Consultants Facilitating Annual TAG Cybersecurity Simulation

Security architects will offer network security advice to businesses ADAPTURE security architects will present information on improving IT security and maintaining effective responses to cyberattacks during the annual Technology Association of Georgia Cybersecurity Simulation at Kennesaw State University on May 18. Ahmed Abdalla, Elliott Abraham and Cedric Caldwell will present vital security information on cyberattack prevention and recovery [...]

2016-03-30T10:32:34-04:00March 30th, 2016|Cybersecurity, News & Press|
  • University Cybersecurity

Ramping Up University Cybersecurity

Are Colleges and Universities Vulnerable to Cyberattacks? Colleges and universities are increasingly being targeted by cyber-attackers, including state-sponsored advanced persistent threat groups, who view these institutions as treasure troves of valuable information. Protecting the valuable data held at these schools will take a multi-tiered approach centered on incident response and proactive security. Schools are already under siege from [...]

2016-03-22T09:58:23-04:00March 22nd, 2016|Cybersecurity, Security|
  • DEFEATING THE CYBER KILL CHAIN

Defeating the Cyber Kill Chain

What is the Kill Chain? Cyber-attackers executing advanced threats against organizations utilize what’s known as the cyber kill chain. The kill chain is the “high-level framework or workflow that advanced threat actors employ in their efforts to compromise the target,” according to Dell SecureWorks. “Actors behind advanced threats have a toolbox of exploit techniques at their disposal,” says [...]

2016-02-10T11:08:47-05:00February 10th, 2016|Cybersecurity, Security|
  • Fireeye and F5 partnership

FireEye and F5 Partnership Takes Aim at Evolving Cyberthreats

In this post: Read about the newly formed FireEye and F5 partnership and its impact on defense against evolving cyberthreats.  Cybersecurity firm FireEye and application delivery provider F5 recently announced a partnership aimed at defending against evolving cyberthreats targeting companies around the world. Enterprises today are faced with the challenges of supporting cloud-based applications and mobile environments, while [...]

2015-11-25T14:48:59-05:00November 25th, 2015|Cybersecurity, Security|
  • kill chain

Disrupting the Cyber-Attack Kill Chain

Cybercriminals today are utilizing increasingly complex techniques to infiltrate corporate networks—while evading detection—in an effort to steal intellectual property and other sensitive information. Knowing the techniques cyber-attackers use and how to defend against them is paramount to an organization’s success in disrupting the cyber-attack kill chain. The Onslaught of Malware Attackers are constantly bombarding networks with malware in [...]

2015-11-09T13:42:11-05:00November 9th, 2015|Cybersecurity, Security|
  • Which Countries Attack

National Cybersecurity Awareness Month 2015: WHO is Attacking & WHO is Getting Attacked?

In this post: Read an infographic to learn which countries attack the most and which countries are attacked the most in the realm of cybersecurity. Only a few more days remain in October as we wrap up the 12th Annual National Cybersecurity Awareness Month! As hackers attack industries all across the world, do you know which countries hack [...]

2015-10-28T16:17:50-04:00October 28th, 2015|Cybersecurity, Security|
  • Prepared for a cyber attack

National Cybersecurity Awareness Month 2015: Are You Prepared?

In this post: Learn if your company is prepared for a cyber attack with an infographic by ADAPTURE.  This October marks the 12th Annual National Cybersecurity Awareness Month! Did you know that while 83% of companies believe that cyberattacks are one of the three biggest threats faced today, only 38% of companies feel prepared for a cyber attack? [...]

2015-10-23T16:23:58-04:00October 23rd, 2015|Cybersecurity, Security|
Go to Top