Security

Think Forward.

  • Mitigating L7 DDos Attacks

Mitigating L7 DDoS Attacks

Distributed denial-of-service attacks are one of the oldest cybersecurity threats. The cybersecurity industry has largely learned how to deal with these attacks. A majority of internet service providers and public cloud vendors are able to provide basic protection against most volume-based DDoS attacks. Hackers have adapted to these new protections that are now in place. One of the [...]

2021-08-10T08:51:25-04:00August 10th, 2021|Cloud, Cybersecurity, DDoS, Security|
  • Securing the expanding network perimeter

Securing the Expanding Network Perimeter

Remote work, public cloud, SASE – Cloudflare, Cisco (Balancing Security, Performance, and Cost) Securing a company-wide network is imperative for any organization. Hackers have more opportunities than ever to break through network perimeters and steal valuable information. The reality is that the perimeter is vanishing due to continued expansion for organizations of all sizes. Companies need to protect [...]

2021-08-02T10:22:50-04:00August 2nd, 2021|Cybersecurity, Infrastructure, Networking, Security|
  • Credential stuffing vs brute force

Credential Stuffing vs Brute Force – When Strong Passwords Are Not Enough

Credential Stuffing vs Brute Force Over the past couple of decades, we’ve been constantly reminded to use strong passwords. This was supposed to minimize the risk of an account takeover (ATO) and, more importantly, a full-blown data breach. Strong passwords were supposed to fend off brute force attacks, the most commonly used attack vector to break into [...]

2021-07-30T09:43:42-04:00July 30th, 2021|Cybersecurity, Security|
  • The real danger of compromised passwords

The Real Danger of Compromised Passwords

Every now and then, we receive email notifications warning us that our account might have been compromised in a data breach. In fact, if you have a Google account, you’ve probably seen a list of some non-Google accounts you own that have compromised passwords. If you haven’t been paying attention to these warnings, you really should. Here’s why. [...]

2021-07-27T10:11:20-04:00July 27th, 2021|Cybersecurity, Security|
  • Understanding Secure Access Service Edge (SASE) – Cloudflare

The Future of Networking: Understanding Secure Access Service Edge (SASE) – Cloudflare

The Future of Networking: Understanding Secure Access Service Edge (SASE) – Cloudflare The cloud has completely changed how businesses operate. Workers can access data and applications from anywhere in the world, as long as they have access to an internet connection. This trend has only accelerated since the start of the pandemic. Companies are constantly innovating in order [...]

2021-07-14T08:49:50-04:00July 14th, 2021|Infrastructure, Networking, Security|
  • cisco secure remote work

Top Five Things To Know From Cisco’s Future of Secure Remote Work Report

COVID-19 completely turned the world upside down. Organizations around the world had to rapidly adapt to stay-at-home orders and equip employees with the ability to work remotely and securely. This sudden switch to remote work is going to affect all aspects of how an organization is run for decades to come. Cisco recently surveyed more than 3,000 IT [...]

2021-06-17T13:26:46-04:00June 17th, 2021|For Hiring Managers, Security, Talent|
  • Protecting-End-Users

Protecting End Users from Phishing Attacks

Last time, we introduced you to phishing attacks and explained why it’s something you need to be concerned about, especially in light of its recent resurgence. We promised to discuss how you can protect your end users from them, so here we are. Here are some of the countermeasures you can implement. Educate your end users Of all [...]

2023-03-09T16:39:06-05:00June 9th, 2021|Cybersecurity, Security|

Is the Resurgence of Phishing Attacks A Cause For Concern?

Is the Resurgence of Phishing Attacks A Cause For Concern? Easily one of the oldest attack vectors in the history of cybercrime, phishing attacks remain one of the most commonly used techniques for spreading malware, stealing credentials, infiltrating a network, or carrying out a range of nefarious acts on an organization. At the peak of the pandemic [...]

2021-05-18T13:40:59-04:00May 18th, 2021|Cybersecurity, Security|

Four Questions Before Deploying a NAC Solution 

You have been tasked with deploying a NAC solution. Unfortunately, IT leaders taking on this endeavor often find themselves confronted with some ugly truths about their network infrastructure and the bandwidth of their internal resources. ADAPTURE Cisco ISE expert Andy Thompson addresses four common questions utilizing his experiences with the industry-leading NAC solution Cisco ISE.   Question: What Can I Expect While Deploying a NAC Solution?  Answer: [...]

2021-03-02T17:16:51-05:00March 2nd, 2021|Cybersecurity, Infrastructure, Security|
  • Close the Cybersecurity Gap with Managed Cisco ISE

Closing the Cybersecurity Gap with Managed Cisco ISE Services

ADAPTURE Solutions Architect Andy Thompson writes about why companies are turning to Managed Cisco ISE Services for a more comprehensive and effective cybersecurity solution. Ask just about any CTO or CSO what keeps them up at night.  The consensus of those individuals would be: “Do users that have access to our network that makes them capable of seeing [...]

2020-11-16T11:47:02-05:00November 16th, 2020|Cybersecurity, Infrastructure, Security|
Go to Top