Security

Think Forward.

  • cloudbleed

The Cloudbleed Incident: Finally, Some Good News

Written by Elliott Abraham, CISSP Senior Security Architect at ADAPTURE What is Cloudbleed? There is a serious new internet bug in the news, and it even has one of those sinister sounding names. This bug, dubbed “Cloudbleed” by the security researcher who discovered it, is named in part because of its similarity to the Heartbleed bug, which infected [...]

2017-03-01T10:45:46-05:00March 1st, 2017|Cloud, Cybersecurity, Security|
  • ransomware

3 Signs You’re Not Taking the Threat of Ransomware Seriously Enough

Written by Elliott Abraham, CISSP Senior Security Architect at ADAPTURE What is Ransomware? Ransomware represents the convergence of malicious intent and the hope for financial gain among the new tactics and motives of threat actors. Tactically speaking, ransomware continues to leverage existing malware as a method of infecting end user systems with the new, somewhat sinister, twist of [...]

2017-02-27T12:09:53-05:00February 27th, 2017|Security|
  • F5 Ticketbleed

Technical Breakdown: F5 Ticketbleed Remediation

Written by Tim Cullen, CISSP, F5-CTS Senior Security Architect at ADAPTURE What is F5 Ticketbleed? In late October, a vulnerability was discovered that affects all versions of F5 TMOS from versions 11.4 to 12.1. This was originally discovered by Filippo Valsorda of the Cloudflare Crypto Team. (You can read about how the vulnerability was detected by reading Filippo’s blog [...]

2017-02-14T12:34:04-05:00February 14th, 2017|Security, SSL|
  • Penetration Testing

From the Experts: Network Penetration Testing Best Practices and the Related Challenges

Taking a Best-Practices Approach to Penetration Testing Written by: Elliott Abraham, CISSP - Senior Security Architect at Adapture Penetration Testing or, as it’s known somewhat euphemistically, PEN Testing is a vital component of an overall risk management program. PEN Testing is so vital and is taken so seriously that the Payment Card Industry (PCI) in March of 2015 published [...]

2025-02-21T09:26:16-05:00February 1st, 2017|Cybersecurity, Networking, Penetration Testing, Security|
  • AWS Cloud

Managing Your Data Within the AWS Cloud

In a period where IT budgets are tightening up, adopting a public cloud infrastructure-as-a-service helps organizations keep costs down while improving business agility and achieving higher scalability. And although public clouds such as AWS offer services like computing, storage, networking and infrastructure security, it’s up to individual organizations to manage, secure and understand their applications and data within [...]

2024-06-17T15:01:10-04:00January 30th, 2017|Cloud, Security|
  • cybersecurity stories

Year in Review: The Top Cybersecurity Stories of 2016

From the massive data breach at Yahoo! to the constant coverage of Russia’s cyber campaign interfering in the U.S. election, 2016 was a year in which cybersecurity received constant mainstream coverage. Here’s a breakdown of the top cybersecurity stories of 2016, proving no information is safe from cyber-attackers: Wendy’s Breach Compromises Payment Cards Fast-food chain Wendy’s was impacted [...]

2024-06-19T10:15:57-04:00January 9th, 2017|Cloud, Cybersecurity, DDoS, Security|
  • Cisco PIX firewalls

#Infosec Alert: What the Shadow Broker 0-Day BenignCertain Means to You

Cisco PIX firewalls named along with other top-tier security devices in BenignCertain exploit from Shadow Brokers Written by: Elliott Abraham, Senior Security Consultant at ADAPTURE The central tenets of every information security program are intended to protect the Confidentiality, Integrity and Availability (CIA) of vital network resources. End users often entrust this critical responsibility to service providers, manufacturers, [...]

2016-08-22T10:04:51-04:00August 22nd, 2016|Cybersecurity, Security|
  • Ransomware

It’s Time to Get Serious About Ransomware

A Strong Business Continuity Plan Will Lessen the Threat  A recent email scam, claiming to be from energy company AGL, targeted 10,000 Australians, according to The Sydney Morning Herald. The email tricks a user into downloading a copy of a bill which then installs malware—known as ransomware—that locks a computer down and demands a sum of money in [...]

2016-06-15T14:29:43-04:00June 15th, 2016|Cloud, Cybersecurity, Security|
  • Annual Threat Report

What Dell’s Annual Threat Report Says About the State of Cybersecurity

What is Dell's Annual Threat Report? Dell recently released its Annual Threat Report, which collected data throughout 2015 using the company’s SonicWALL Global Response Intelligence Defense network. The network provides daily feeds from more than one million firewalls and tens of millions of connected endpoints, Dell SonicWALL traffic and other industry sources. The results paint a troubling picture: [...]

2016-05-18T11:42:44-04:00May 18th, 2016|Cloud, Cybersecurity, Security|
  • University Cybersecurity

Ramping Up University Cybersecurity

Are Colleges and Universities Vulnerable to Cyberattacks? Colleges and universities are increasingly being targeted by cyber-attackers, including state-sponsored advanced persistent threat groups, who view these institutions as treasure troves of valuable information. Protecting the valuable data held at these schools will take a multi-tiered approach centered on incident response and proactive security. Schools are already under siege from [...]

2016-03-22T09:58:23-04:00March 22nd, 2016|Cybersecurity, Security|
Go to Top