In the News: ADAPTURE and The Centrics Group Announce MergerRead More

Close

What Makes Cloud Secure?

It can be difficult as an IT professional to put your trust in public cloud environments after a year full of announcements of cybersecurity breaches. After all, you’re moving your most vital information into an infrastructure that you didn’t build yourself, and the nature of this environment means you must trust the cloud provider to [...]

February 28th, 2018|Categories: Cloud, Cloud Security|

Year in Review: The 5 Worst Hacks of 2017

In 2017, breaches reached a new peak as hackers perfected the art of compromising systems. Last October, we explored the spooky effects of ransomware attacks in our post, Three Ransomware Horror Stories. From the Equifax data breach to HBO's stolen files, let's take a closer look at the worst hacks of 2017. The Worst Hacks [...]

January 5th, 2018|Categories: Cloud Security, Cybersecurity, Security|

Check Point vSEC for Cloud Security: What You Need to Know

In this post: Learn about the use of Check Point vSEC to protect your assets in the cloud environment.   Network virtualization provides a range of business benefits, including increased productivity, reduced hardware costs, and faster server provisioning and deployment. In fact, an increasing number of companies are adopting Infrastructure as a Service (IaaS) technology because [...]

October 9th, 2017|Categories: Cloud, Cloud Security, Security|Tags: |

The Reality of Cloud Security Issues: The Human Factor

In this post: Learn how to strengthen the weakest point of your cloud security measures: the human factor.  No matter the software you have installed, the technology you own, or the protocols you have in place, cloud security breaches will usually happen at the weakest link in the chain. Unfortunately, the most common weakest link [...]

August 10th, 2017|Categories: Cloud, Cloud Security, Cybersecurity, Security|

Ask the Experts: Evaluating Leading Endpoint Security Vendors

Advantages and Disadvantages of Three Top Endpoint Security Vendors By Tim Cullen, CISSP, F5-CTS and Jacob Hunt Security Architects at ADAPTURE Endpoint Protection (EPP) Security is a suite of software that is installed on laptops, desktops, and servers. The purpose is to prevent multiple types of malicious threats from infecting the local machine. These threats [...]

July 16th, 2017|Categories: Cloud Security, Cybersecurity, Security|

From the Experts: F5 Herculon Part 2 – DDoS Hybrid Defender

Written by Tim Cullen, CISSP, F5-CTS Senior Security Architect at ADAPTURE Many of our clients have expressed interest in learning more about the latest F5 offering: F5 iSeries. I gave a high-level overview of the new product line in a recent post, and reviewed the associated solution F5 Herculon: SSL Orchestrator in Part 1 of [...]

March 3rd, 2017|Categories: Cloud Security, DDoS, Security|

From the Experts: F5 Herculon Part 1 – SSL Orchestrator

Written by Tim Cullen, CISSP, F5-CTS Senior Security Architect at ADAPTURE In our recent post about the new F5 iSeries line of products, we discussed some of the hardware changes and performance increases the iSeries boasts. I wanted to take this conversation a step further and discuss how to fully utilize that hardware with a [...]

March 3rd, 2017|Categories: Cloud Security, Security, SSL|

The Cloudbleed Incident: Finally, Some Good News

Written by Elliott Abraham, CISSP Senior Security Architect at ADAPTURE What is Cloudbleed? There is a serious new internet bug in the news, and it even has one of those sinister sounding names. This bug, dubbed “Cloudbleed” by the security researcher who discovered it, is named in part because of its similarity to the Heartbleed [...]

March 1st, 2017|Categories: Cloud, Cloud Security, Cybersecurity, Security|

Year in Review: The Top Cybersecurity Stories of 2016

From the massive data breach at Yahoo! to the constant coverage of Russia’s cyber campaign interfering in the U.S. election, 2016 was a year in which cybersecurity received constant mainstream coverage. Here’s a breakdown of the top cybersecurity stories of 2016, proving no information is safe from cyber-attackers: Wendy’s Breach Compromises Payment Cards Fast-food chain [...]

January 9th, 2017|Categories: Cloud Security, Cybersecurity, DDoS, Security|

It’s Time to Get Serious About Ransomware

A Strong Business Continuity Plan Will Lessen the Threat  A recent email scam, claiming to be from energy company AGL, targeted 10,000 Australians, according to The Sydney Morning Herald. The email tricks a user into downloading a copy of a bill which then installs malware—known as ransomware—that locks a computer down and demands a sum [...]

June 15th, 2016|Categories: Cloud Security, Cybersecurity, Security|
Load More Posts