Security

Think Forward.

[WATCH] ADAPTURE Response to NSS Labs NGFW Report

The NSS Labs Report for Next Generation Firewalls was released earlier this year. Our Senior Security Consultant, Elliott Abraham, gives his professional opinion about the report and Dell SonicWall’s performance. Watch the video below. The NSS Labs Report is an independent study testing Next Generation Firewalls (NGFW) against their vendors’ specifications, and it is a comparative analysis of [...]

2014-10-28T15:52:35-04:00October 28th, 2014|Security|
  • Security Breaches

A Gory Mess – Security Breaches of 2014… So Far

Heartbleed. Shellshock. Backoff. These aren’t titles to the latest Halloween thriller, but for those who know, they’re scary enough to be. 2014 has been a terrifying year for security. With attacks on Retail, eCommerce, Healthcare, Finance and even non-profits, no one is safe, and it feels like we are falling into our own digital version of World War [...]

2014-10-27T17:24:12-04:00October 27th, 2014|Cybersecurity, Security, SSL|
  • byod security risks

BYOD Security Risks

Here's a statistic that would alarm any CIO: Almost half of employees have accessed corporate data while browsing unsecured public networks, and most employees never report any missing or stolen BYODs until later. With personal security already being breached via large retailers and popular online sites, it does not ease the minds of CIOs to know their corporate [...]

2014-06-20T16:49:24-04:00June 20th, 2014|BYOD, Security|
  • Heartbleed

What Is Heartbleed and How Should You Protect Yourself?

What is Heartbleed? On April 7, 2014, it was announced that a computer bug known as "Heartbleed Bug" has been exposing allegedly secure information around the world. Heartbleed Bug, essentially an information leak, is allowing outsiders to gain access to personal information intended to be secure on the internet. The bug has gone undetected since October, 2011. Security [...]

2014-04-15T16:37:02-04:00April 15th, 2014|Security|
  • Technology Association of Georgia - Business Cybersecurity Day

ADAPTURE Participates In Georgia Business Cybersecurity Day

February 25th, 2014 has been declared Business Cybersecurity Day by Governor Nathan Deal here in our home state of Georgia. In recognition of this day, the Technology Association of Georgia, the Georgia National Guard and numerous state government departments are hosting a cybersecurity simulation event. The exercise will prepare Georgia businesses to respond quickly and proactively to today's [...]

2024-06-24T11:03:42-04:00February 24th, 2014|News & Press, Security|
  • IT security challenges

Olympic Solutions: IT Security Challenges at the 2014 Winter Olympics

The XXII Olympic Winter Games will showcase 90 competitive events in 15 different sports. Athletes from around the world set cultural and political boundaries aside to participate in spirited, patriotic competition. For many, the Games are a symbol of what the world can be when we work in cooperation toward a common goal under the guiding principles of [...]

2014-02-04T16:26:01-05:00February 4th, 2014|BYOD, Security|
  • mobile device management

Mobile Device Management: Keeping BYOD Policies Secure and Companies Out of the Courtroom

With the recent rise in popularity of "bring your own device" (BYOD) policies at companies across the world, many technology leaders are finding themselves in legal binds after improperly setting company guidelines for mobile device management. CIO.com reports that in the last few years, companies found themselves in legal trouble after writing "overly broad policies or policies that [...]

2014-01-20T16:17:28-05:00January 20th, 2014|BYOD, Security|
  • BYOD Policies

BYOD Policies to Prevent BYOD Threats

In this post: Learn about a rising trend in the workforce, BYOD, and how companies can institute effective BYOD policies. The Balancing Act: Flexibility or Security? The balancing act between freedom and control is not a new issue to people of the 21st century. We see this struggle daily in government, politics, and even with our children at [...]

2013-12-31T16:05:00-05:00December 31st, 2013|BYOD, Security|
  • BYOD Infographic

Infographic: BYOD Friend or Foe?

Bring Your Own Data (BYOD) is a hot topic in today's IT world. As you step into the new year, it's time to consider how your BYOD practices may be jeopardizing your company's security.  The below BYOD infographic will shed some light on top concerns and best practices. With the ever-changing IT landscape, you need to make sure your [...]

2025-02-13T16:09:39-05:00December 18th, 2013|BYOD, Security|

Homeland Fact vs. Fiction: Barnaby Jack and the Death of Vice President Walden

The third season of Homeland premiered Sunday night [no season three spoilers], and fans across the country tuned in to find out what became of Saul, Carrie, and Brody after the season two finale. For those less familiar with the Emmy-winning Showtime thriller, the premise of Homeland centers on the hot-button topic of U.S. homeland [...]

2013-09-23T15:56:51-04:00September 23rd, 2013|News & Press, Security|
Go to Top