• ®
  • About
    • About Us

      Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.

      Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.

    • Leadership
    • Careers
  • Solutions

    Governance, Risk & Compliance

    • Compliance Audit & Risk Assessment
    • Compliance Program Development
    • Continuous Compliance & Policy Management

    Attack Surface Management

    • Tool Consolidation & Optimization
    • Configuration & Deployment
    • Testing & Exposure

    Managed XDR & SecOps

    • Fusion MXDR
    • Configuration & Managed Services

    Microsoft Security Solutions

    • Threat Protection & Cloud Security
    • Data Security, Compliance & Privacy
    • Identity & Endpoint Management
    • AI Safety & Security
    • Microsoft Security Foundations
  • Partners
  • News & Resources
    • All resources
    • Flash-Notices
    • Blogs
    • Webinars

    Latest resource

    Building Trust Over Time: SOC 2 and the Importance of Annual Audits

    Business relationships are founded on trust, and in today’s digital world, trust around data security is especially critical.

    Learn more
  • Contact
    • About Us
    • Leadership
    • Careers
  • Governance, Risk & Compliance

    • Compliance Audit & Risk Assessment
    • Compliance Program Development
    • Continuous Compliance & Policy Management

    Attack Surface Management

    • Tool Consolidation & Optimization
    • Configuration & Deployment
    • Testing & Exposure

    Managed XDR & SecOps

    • Fusion MXDR
    • Configuration & Managed Services

    Microsoft Security Solutions

    • Threat Protection & Cloud Security
    • Data Security, Compliance & Privacy
    • Identity & Endpoint Management
    • AI Safety & Security
    • Microsoft Security Foundations
  • Partners
    • All resources
    • Flash-Notices
    • Blogs
    • Webinars
  • Contact

Avertium Blog

 | Feb 25, 2020

Why your Customer Service needs Chatbot Security

Chatbot security is important as customer service uses more sophisticated artificial intelligence (AI) tools to collect personal data.
 | Feb 18, 2020

What you need to know about the New NIST Privacy Framework

Learn about the new NIST Privacy Framework and how organizations can use it to manage risks in compliance with consumer privacy legislation and regulation.
 | Feb 16, 2020

Updates on North Korea's HIDDEN COBRA

This report shows the latest updates on HIDDEN COBRA malware toolsets including ARTFULPIE, CROWDEDFLOUNDER, HOTCROISSANT, HOPLIGHT, and SLICKSHOES.
 | Feb 10, 2020

CDPwn: Five Cisco Vulnerabilities

This threat report is about CDPwn, the collective name for five major Cisco vulnerabilities affecting a multitude of the company's products.
 | Jan 29, 2020

5 Steps to Recovering from a failed PCI ROC

Failing a PCI ROC doesn’t mean the end of your ability to do business. Our PCI QSAs provides five steps to recovering from a failed ROC.
 | Jan 21, 2020

The ABCs of CVE-2020-0601

In this article, we will discuss what you need to know about CVE-2020-0601 and the Windows Crypt32.dll vulnerability.
 | Jan 20, 2020

3 ways to optimize your existing Cybersecurity Investment

Learn how optimizing your current cybersecurity investment pays better dividends than spending on additional tools and helps to protect against cybercrime.
 | Jan 16, 2020

Citrix CVE-2019-19781: The Facts

What you need to know about the Citrix vulnerability CVE-2019-19781 if your environment is affected and the mitigation steps to take.
 | Jan 15, 2020

Using Deception Against Pass-the-Hash Attacks

Learn how to use deception against pass-the-hash attacks to subtly guide even experienced attackers away from data and where you want them to go.
 | Jan 9, 2020

Deception in Cyber Defense in Layman's Terms

This is an introduction to the use of deception as a defensive mechanism in cybersecurity. It includes the use of honey pots in cyber defense.
Prev 16 17 18 19 20 Next
Cybersecurity Solutions
  • Governance, Risk, + Compliance (GRC)
  • Attack Surface Management (ASM)
  • Managed XDR & SecOps
  • Microsoft Security Solutions
Company
  • About Avertium
  • Partners
  • Leadership Team
  • Careers
  • Resources
  • Contact
  • Privacy and Legal

Sign up for weekly Flash Notices, tips and security news.

Have questions? Give us a call at 877-707-7997.

logo
Avertium Cyber Fusion Centers
Arizona • Tennessee

Copyright © 2025 Avertium.
All Rights Reserved. Privacy Policy