Blog

News, Latest Research and More

  • Wireless Technology

What’s Next in Wireless Technology?

Written by Andy Thompson Senior Solutions Architect at ADAPTURE What’s the next wave in wireless? I am going to introduce this topic by discussing 802.11ac Wave 2, as I believe this is a foundation for many of the new and exciting technologies that may soon hit the market. Even though AC Wave 2 may not be a new technology, it [...]

2017-03-03T19:31:49-05:00March 3rd, 2017|Infrastructure, Networking|
  • cloudbleed

The Cloudbleed Incident: Finally, Some Good News

Written by Elliott Abraham, CISSP Senior Security Architect at ADAPTURE What is Cloudbleed? There is a serious new internet bug in the news, and it even has one of those sinister sounding names. This bug, dubbed “Cloudbleed” by the security researcher who discovered it, is named in part because of its similarity to the Heartbleed bug, which infected [...]

2017-03-01T10:45:46-05:00March 1st, 2017|Cloud, Cybersecurity, Security|
  • team productivity

Managers, Your Emotional Intelligence Affects Your Team Productivity

As a manager, your primary responsibility is to ensure your team productivity by making sure your team members have the tools, resources, and capabilities needed to get the job done. But being a manager is about more than just getting ducks in a row; it’s also about recognizing and managing the emotions of your team members—and yourself. According [...]

2024-06-18T12:08:45-04:00February 28th, 2017|For Hiring Managers, Talent|
  • ransomware

3 Signs You’re Not Taking the Threat of Ransomware Seriously Enough

Written by Elliott Abraham, CISSP Senior Security Architect at ADAPTURE What is Ransomware? Ransomware represents the convergence of malicious intent and the hope for financial gain among the new tactics and motives of threat actors. Tactically speaking, ransomware continues to leverage existing malware as a method of infecting end user systems with the new, somewhat sinister, twist of [...]

2017-02-27T12:09:53-05:00February 27th, 2017|Security|
  • F5 Ticketbleed

Technical Breakdown: F5 Ticketbleed Remediation

Written by Tim Cullen, CISSP, F5-CTS Senior Security Architect at ADAPTURE What is F5 Ticketbleed? In late October, a vulnerability was discovered that affects all versions of F5 TMOS from versions 11.4 to 12.1. This was originally discovered by Filippo Valsorda of the Cloudflare Crypto Team. (You can read about how the vulnerability was detected by reading Filippo’s blog [...]

2017-02-14T12:34:04-05:00February 14th, 2017|Security, SSL|
  • list contract jobs on resume

The Best Way to List Contract Jobs on Your Resume

Contract work can be an excellent way to gain experience in a new career field or a way to survive gaps in employment. But how do you list contract jobs on your resume or in an interview? Many people have concerns about listing temporary or contract jobs on their resume, believing it will make them look “flighty” or [...]

2017-02-14T11:16:07-05:00February 14th, 2017|For Job Seekers, Talent|
  • F5 iSeries

Ask the Experts: F5 iSeries – What You Need to Know

Written by Tim Cullen, CISSP and F5-CTS Senior Security Architect at ADAPTURE A few months ago, I was suddenly aware of a “disturbance in the force.” (That’s my way of saying my inbox started blowing up). It was a product announcement from F5—they had launched the F5 iSeries product. I was intrigued, and many of my clients and colleagues [...]

2017-02-07T10:31:04-05:00February 7th, 2017|Infrastructure|
  • Penetration Testing

From the Experts: Network Penetration Testing Best Practices and the Related Challenges

Taking a Best-Practices Approach to Penetration Testing Written by: Elliott Abraham, CISSP - Senior Security Architect at Adapture Penetration Testing or, as it’s known somewhat euphemistically, PEN Testing is a vital component of an overall risk management program. PEN Testing is so vital and is taken so seriously that the Payment Card Industry (PCI) in March of 2015 published [...]

2024-06-19T10:07:10-04:00February 1st, 2017|Cybersecurity, Networking, Penetration Testing, Security|
  • IoT security

IoT Security, or Lack Thereof

This post was written by Mindy Affrime, guest contributor from Securolytics. While IoT devices (printers, DVRs, thermostats, smart appliances, etc.) make it possible for organizations of every size and in every sector to run more effectively and efficiently, they are too often added to a business' network without any regard to their security risk. Unfortunately for many manufacturers [...]

2017-01-31T13:31:01-05:00January 31st, 2017|Cybersecurity|
  • AWS Cloud

Managing Your Data Within the AWS Cloud

In a period where IT budgets are tightening up, adopting a public cloud infrastructure-as-a-service helps organizations keep costs down while improving business agility and achieving higher scalability. And although public clouds such as AWS offer services like computing, storage, networking and infrastructure security, it’s up to individual organizations to manage, secure and understand their applications and data within [...]

2024-06-17T15:01:10-04:00January 30th, 2017|Cloud, Security|
Go to Top