Security

Think Forward.

  • email security

The Need for Email Security in Curbing Advanced Persistent Threats (APT) Attacks

Importance of Email Security Email security is important now more than ever as organizations face an ever-increasing number of threats from email-based spam, viruses and advanced attacks. The issue recently saw renewed attention following reports that U.S. Presidential candidate Hillary Clinton used a private email account and server to conduct official business while she was working for the [...]

2024-06-19T10:56:44-04:00May 26th, 2015|Security|
  • penetration testing

Penetration Testing: Staying One Step Ahead of the Hackers

As hackers continue to identify and exploit vulnerabilities within organizations’ systems to obtain sensitive information, companies need to conduct penetration testing to find and remediate those flaws. What is a Penetration Test? A penetration test looks for ways to exploit vulnerabilities to circumvent or defeat the security features of a company’s system components, according to the PCI Security [...]

2015-05-15T11:39:06-04:00May 15th, 2015|Penetration Testing, Security|
  • cybersecurity

Cybersecurity Spending Increases Following Large-Scale Breaches

Anthem Inc. JPMorgan Chase. Home Depot. Recent data breaches at these organizations, which affected millions of customers and disclosed sensitive information, show that all companies need to make cybersecurity a priority. Increase in Cybersecurity Spending This concerning trend is contributing to a growing increase in cybersecurity spending, according to Gartner Inc., an information technology research and advisory company. [...]

2015-04-21T11:36:31-04:00April 21st, 2015|Cybersecurity, Security|

ADAPTURE Partner FireEye Featured on CBS’ 60 Minutes

FireEye leader Kevin Mandia speaks about FireEye’s involvement in the Sony cyber-attack response [Video link at bottom of post.] Those of us working in technology have always understood the dangerous consequences of poor security around your network and infrastructure—where sensitive data typically resides. But with companies being hacked seemingly every day now, cybersecurity is now part of the [...]

2015-04-17T11:29:00-04:00April 17th, 2015|News & Press, Security|

ADAPTURE Joins Technology Association of Georgia’s Cybersecurity Simulation for the Second Consecutive Year

Cybersecurity simulation event demonstrates risks associated with cyber threats toward Georgia Businesses ATLANTA, Ga., Mar. 2015 — The Technology Association of Georgia (TAG) is holding its annual cybersecurity simulation on May 5 at Southern Polytechnic State University. Demonstrations at this event simulate cyber attacks, reinforce preventative measures, and address recovery actions in the instance of an attack. Security [...]

2024-07-18T12:19:17-04:00April 15th, 2015|News & Press, Security|

[Infographic] A 2014 Study of Company Data Breaches

Data breaches can have a devastating effect on an organization, and recent trends are showing that the cost of recovery from a data breach is rising. A recent study of company data breaches shows since 2013 that the average total cost of a data breach increased 15% to $3.5 million. The study also found that the countries least [...]

2015-04-06T16:14:34-04:00April 6th, 2015|Security|
  • f5 Cloud Security

Renting the Castle: F5 Cloud Security

Software is taking over the world. Have you heard that one before? The rise of public clouds like AWS and vCloud Air moves your data from your protected data center and into someone else’s domain. It’s one thing to protect your infrastructure if you own it, but what if you don’t? Cloud security requires a change in thinking. [...]

2014-12-02T17:34:13-05:00December 2nd, 2014|Cloud, Security|
  • Cloud Security in 7 Steps

Cloud Security in 7 Steps

We’ve talked about how the security breaches in 2014 can make IT security feel like a Hollywood slasher. Sticking together will help, but what about some practical tips for staying safe out there? Here's cloud security in 7 steps. 1. Protect more than the perimeter. Think about the number of people who have access to your network: employees, [...]

2014-11-14T17:28:45-05:00November 14th, 2014|Cloud, Security|

[WATCH] ADAPTURE Response to NSS Labs NGFW Report

The NSS Labs Report for Next Generation Firewalls was released earlier this year. Our Senior Security Consultant, Elliott Abraham, gives his professional opinion about the report and Dell SonicWall’s performance. Watch the video below. The NSS Labs Report is an independent study testing Next Generation Firewalls (NGFW) against their vendors’ specifications, and it is a comparative analysis of [...]

2014-10-28T15:52:35-04:00October 28th, 2014|Security|
Go to Top