Think Forward: The ADAPTURE Blog

Home /

#Infosec Alert: What the Shadow Broker 0-Day BenignCertain Means to You

Cisco PIX firewalls named along with other top-tier security devices in BenignCertain exploit from Shadow Brokers

[...]

It’s Time to Get Serious About Ransomware

A Strong Business Continuity Plan Will Lessen the Threat

A recent email scam, claiming to be from energy company AGL, targeted 10,000 Australians, according to The Sydney Morning Herald. The email tricks a user into downloading a copy of a billfalse

[...]

What Dell’s Annual Threat Report Says About the State of Cybersecurity

Dell recently released its Annual Threat Report, which collected data throughout 2015 using the company’s SonicWALL Global Response Intelligence Defense network. The network provides daily feeds from more than one million firewalls and tens offalse

[...]

Energy Efficiency as a Data Center Priority

How ADAPTURE Partners are Leading the Way

[...]

ADAPTURE consultants facilitating annual TAG Cybersecurity Simulation

Security architects will offer network security advice to businesses

[...]

Ramping Up University Cybersecurity

Colleges and universities are increasingly being targeted by cyber-attackers, including state-sponsored advanced persistent threat groups, who view these institutions as treasure troves of valuable information. Protecting the valuable data held atfalse

[...]

Defeating the Cyber Kill Chain

Cyber-attackers executing advanced threats against organizations utilize what’s known as the kill chain. The kill chain is the “high-level framework or workflow that advanced threat actors employ in their efforts to compromise the target,” accordingfalse

[...]

The Evolution of Advanced Persistent Threats

Earlier this year, we have witnessed three different and very serious data breaches. Between the Target breach, the Ashley Madison attack, and the Sony breach, security attacks are evolving. The Ashley Madison attack is a great example of the newfalse

[...]

FAQ About McAfee EOL Announcement

Q: Why are McAfee’s email security solutions entering EOL? A: Intel-McAfee plans on increasing investments in other critical areas requiring exiting other product areas such as McAfee Web and Email Security Solutions.

[...]

FireEye - F5 Partnership Takes Aim at Evolving Cyberthreats

Cybersecurity firm FireEye and application delivery provider F5 recently announced a partnership aimed at defending against evolving cyberthreats targeting companies around the world.

[...]

Leave a reply

Blog Categories

see all