Security

Think Forward.

  • Senior Security Consultant

ADAPTURE Senior Security Consultant Named to Local Cloud Security Alliance Board

Elliott Abraham brings more than 15 years of high-level security expertise to Atlanta chapter of the Cloud Security Alliance Board.  ATLANTA, Mar. 11, 2016—Elliott Abraham, Senior Security Consultant at ADAPTURE, has been named to the board of the Cloud Security Alliance (CSA), Atlanta chapter. Abraham was selected along with four other designees from a group of more than [...]

2016-03-11T16:39:50-05:00March 11th, 2016|Cloud, News & Press, Security|
  • DEFEATING THE CYBER KILL CHAIN

Defeating the Cyber Kill Chain

What is the Kill Chain? Cyber-attackers executing advanced threats against organizations utilize what’s known as the cyber kill chain. The kill chain is the “high-level framework or workflow that advanced threat actors employ in their efforts to compromise the target,” according to Dell SecureWorks. “Actors behind advanced threats have a toolbox of exploit techniques at their disposal,” says [...]

2016-02-10T11:08:47-05:00February 10th, 2016|Cybersecurity, Security|
  • Evolution of Advanced Persistent Threats

The Evolution of Advanced Persistent Threats

In this post: Learn about the new style of attacks that is present in many of the recent, famous data breaches: Advanced Persistent Threats. Earlier this year, we have witnessed three different and very serious data breaches. Between the Target breach, the Ashley Madison attack, and the Sony breach, security attacks are evolving. The Ashley Madison attack is a [...]

2015-12-07T10:55:49-05:00December 7th, 2015|APT, Security|
  • ADAPTURE MCAFEE EOL

FAQ About McAfee EOL Announcement

Q: Why are McAfee’s email security solutions entering EOL? A: Intel-McAfee plans on increasing investments in other critical areas requiring exiting other product areas such as McAfee Web and Email Security Solutions. Q: What are the SKUs that are involved in this EOL? A: EFC SaaS Email Inbound Filtering & Continuity - Appliance Option ELP Email Protection; (Software bundle - subscription) [...]

2015-12-01T14:59:10-05:00December 1st, 2015|News & Press, Security|
  • Fireeye and F5 partnership

FireEye and F5 Partnership Takes Aim at Evolving Cyberthreats

In this post: Read about the newly formed FireEye and F5 partnership and its impact on defense against evolving cyberthreats.  Cybersecurity firm FireEye and application delivery provider F5 recently announced a partnership aimed at defending against evolving cyberthreats targeting companies around the world. Enterprises today are faced with the challenges of supporting cloud-based applications and mobile environments, while [...]

2024-06-17T14:04:53-04:00November 25th, 2015|Cybersecurity, Security|
  • CISA

Senate Passes Cybersecurity Information Sharing Act: What You Need to Know

The U.S. Senate recently passed the Cybersecurity Information Sharing Act (CISA), a bill that would increase cyberthreat information sharing between the government and the private sector. CISA requires the Director of National Intelligence, the Department of Homeland Security, the Department of Defense and the Department of Justice to develop procedures to promote the timely sharing of classified and [...]

2024-07-18T12:43:03-04:00November 18th, 2015|News & Press, Security|
  • kill chain

Disrupting the Cyber-Attack Kill Chain

Cybercriminals today are utilizing increasingly complex techniques to infiltrate corporate networks—while evading detection—in an effort to steal intellectual property and other sensitive information. Knowing the techniques cyber-attackers use and how to defend against them is paramount to an organization’s success in disrupting the cyber-attack kill chain. The Onslaught of Malware Attackers are constantly bombarding networks with malware in [...]

2015-11-09T13:42:11-05:00November 9th, 2015|Cybersecurity, Security|
  • Which Countries Attack

National Cybersecurity Awareness Month 2015: WHO is Attacking & WHO is Getting Attacked?

In this post: Read an infographic to learn which countries attack the most and which countries are attacked the most in the realm of cybersecurity. Only a few more days remain in October as we wrap up the 12th Annual National Cybersecurity Awareness Month! As hackers attack industries all across the world, do you know which countries hack [...]

2015-10-28T16:17:50-04:00October 28th, 2015|Cybersecurity, Security|
  • Prepared for a cyber attack

National Cybersecurity Awareness Month 2015: Are You Prepared?

In this post: Learn if your company is prepared for a cyber attack with an infographic by ADAPTURE.  This October marks the 12th Annual National Cybersecurity Awareness Month! Did you know that while 83% of companies believe that cyberattacks are one of the three biggest threats faced today, only 38% of companies feel prepared for a cyber attack? [...]

2015-10-23T16:23:58-04:00October 23rd, 2015|Cybersecurity, Security|
  • 2015 NATIONAL CYBERSECURITY AWARENESS MONTH - part 1

National Cybersecurity Awareness Month 2015: Key Stats

In this post: Learn some cybersecurity key stats and facts with an infographic by ADAPTURE.  This October marks the 12th Annual National Cybersecurity Awareness Month. With the advancement of technology, we must also acknowledge the risks and challenges of cyberthreats faced by industries today. In an effort to increase awareness, ADAPTURE focuses on educatineg pople about the increased [...]

2015-10-14T16:39:19-04:00October 14th, 2015|Cybersecurity, Security|
Go to Top