Cybersecurity

Think Forward.

  • Enterprise Network Firewalls

Gartner’s 2017 “Leaders” in Enterprise Network Firewalls

ADAPTURE is an Authorized Palo Alto and Check Point Partner Headquartered in Atlanta Today, we will discuss another Gartner Magic Quadrant, and this one has some history to it.  Gartner has recently unified its Enterprise Firewall and Next Generation Firewall categories as vendors have incorporated the “next generation” features, like application and user control and intrusion prevention systems, [...]

2017-08-01T17:09:23-04:00August 1st, 2017|Cybersecurity, Security|
  • partner cylance

ADAPTURE Partner Cylance Among 2017 Gartner “Biggest Movers”

ADAPTURE is an Authorized Cylance Partner Headquartered in Atlanta In this series, we will be highlighting those elite companies that have made it into the coveted quadrants of Gartner’s playing field, starting with the Endpoint Security market. But first, let’s lay some groundwork. When Gartner highlights you in a “Magic Quadrant,” you know that you’re one of the [...]

2017-07-18T16:18:50-04:00July 18th, 2017|Cybersecurity, Security|
  • endpoint security vendors

Ask the Experts: Evaluating Leading Endpoint Security Vendors

Advantages and Disadvantages of Three Top Endpoint Security Vendors By Tim Cullen, CISSP, F5-CTS and Jacob Hunt Security Architects at ADAPTURE Endpoint Protection (EPP) Security is a suite of software that is installed on laptops, desktops, and servers. The purpose is to prevent multiple types of malicious threats from infecting the local machine. These threats include malware, device [...]

2017-07-16T12:57:20-04:00July 16th, 2017|Cloud, Cybersecurity, Security|
  • Petya Ransomware

Petya Ransomware: Ask the Experts

Petya Ransomware: "Bigger Than WannaCry" The Petya ransomware attack began earlier today in Europe and is quickly spreading globally. We asked our experts for their thoughts on this latest attack. Elliott Abraham, CISSP, lamented, "There's no kill switch in Petya. It will most certainly be bigger than WannaCry." Senior Solutions Architect Jacob Hunt added, "The Petya strain has been [...]

2017-06-27T17:30:29-04:00June 27th, 2017|Cybersecurity, Ransomware, Security|
  • Multi-Factor Authentication

How Multi-Factor Authentication Protects Against Phishing Attacks

Written by Elliott Abraham, CISSP Senior Security Architect at ADAPTURE What is Authentication? Authentication is the means by which an entity validates that they are in fact who they claim to be. The most commonly used types of authentication are the very basic username and password. However, this presents a very real challenge for us. Our passwords are [...]

2017-06-19T09:49:47-04:00June 19th, 2017|Cybersecurity, Security|
  • Cylance’s security

The Cost Savings and Business Benefits of Deploying Cylance

A Summary of Forrester Consulting’s Research Findings Using Cylance’s security solutions reduces the risk of security breaches and improves IT and security employees’ productivity, according to a study conducted by Forrester Consulting. Advanced threat protection provider Cylance commissioned Forrester Consulting to conduct a Total Economic Impact study and examine the potential return on investment enterprises could realize by [...]

2017-03-21T11:00:16-04:00March 21st, 2017|Cybersecurity, Security|
  • cloudbleed

The Cloudbleed Incident: Finally, Some Good News

Written by Elliott Abraham, CISSP Senior Security Architect at ADAPTURE What is Cloudbleed? There is a serious new internet bug in the news, and it even has one of those sinister sounding names. This bug, dubbed “Cloudbleed” by the security researcher who discovered it, is named in part because of its similarity to the Heartbleed bug, which infected [...]

2017-03-01T10:45:46-05:00March 1st, 2017|Cloud, Cybersecurity, Security|
  • Penetration Testing

From the Experts: Network Penetration Testing Best Practices and the Related Challenges

Taking a Best-Practices Approach to Penetration Testing Written by: Elliott Abraham, CISSP - Senior Security Architect at ADAPTURE Penetration Testing or, as it’s known somewhat euphemistically, PEN Testing is a vital component of an overall risk management program. PEN Testing is so vital and is taken so seriously that the Payment Card Industry (PCI) in March of 2015 published [...]

2017-02-01T16:23:40-05:00February 1st, 2017|Cybersecurity, Networking, Penetration Testing, Security|
  • IoT security

IoT Security, or Lack Thereof

This post was written by Mindy Affrime, guest contributor from Securolytics. While IoT devices (printers, DVRs, thermostats, smart appliances, etc.) make it possible for organizations of every size and in every sector to run more effectively and efficiently, they are too often added to a business' network without any regard to their security risk. Unfortunately for many manufacturers [...]

2017-01-31T13:31:01-05:00January 31st, 2017|Cybersecurity|
  • cybersecurity stories

Year in Review: The Top Cybersecurity Stories of 2016

From the massive data breach at Yahoo! to the constant coverage of Russia’s cyber campaign interfering in the U.S. election, 2016 was a year in which cybersecurity received constant mainstream coverage. Here’s a breakdown of the top cybersecurity stories of 2016, proving no information is safe from cyber-attackers: Wendy’s Breach Compromises Payment Cards Fast-food chain Wendy’s was impacted [...]

2017-01-09T13:23:03-05:00January 9th, 2017|Cloud, Cybersecurity, DDoS, Security|
Go to Top