• ®
  • About
    • About Us

      Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.

      Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.

    • Leadership
    • Careers
  • Solutions

    Governance, Risk & Compliance

    • Compliance Audit & Risk Assessment
    • Compliance Program Development
    • Continuous Compliance & Policy Management

    Attack Surface Management

    • Tool Consolidation & Optimization
    • Configuration & Deployment
    • Pen Testing & Exposure
    • Advisory Services

    Managed XDR & SecOps

    • Fusion MXDR
    • Configuration & Managed Services

    Microsoft Security Solutions

    • Threat Protection & Cloud Security
    • Data Security, Compliance & Privacy
    • Identity & Endpoint Management
    • AI Safety & Security
    • Microsoft Security Foundations
  • Partners
  • News & Resources
    • All resources
    • Flash-Notices
    • Blogs
    • Webinars

    Latest resource

    Building Trust Over Time: SOC 2 and the Importance of Annual Audits

    Business relationships are founded on trust, and in today’s digital world, trust around data security is especially critical.

    Learn more
  • Contact
    • About Us
    • Leadership
    • Careers
  • Governance, Risk & Compliance

    • Compliance Audit & Risk Assessment
    • Compliance Program Development
    • Continuous Compliance & Policy Management

    Attack Surface Management

    • Tool Consolidation & Optimization
    • Configuration & Deployment
    • Pen Testing & Exposure
    • Advisory Services

    Managed XDR & SecOps

    • Fusion MXDR
    • Configuration & Managed Services

    Microsoft Security Solutions

    • Threat Protection & Cloud Security
    • Data Security, Compliance & Privacy
    • Identity & Endpoint Management
    • AI Safety & Security
    • Microsoft Security Foundations
  • Partners
    • All resources
    • Flash-Notices
    • Blogs
    • Webinars
  • Contact

Avertium Blog

 | Nov 16, 2020

PyXie distributing ransomware tools targeting Healthcare, Education, Government and Technology companies

This threat report is about bad actor PyXie Group's ransomware tools targeting various sectors including healthcare, education, government, and technology.
 | Oct 30, 2020

3 Scary Stories of Data Breach Disasters

3 data breach stories that could happen to any company and that could've been preventable.
 | Oct 27, 2020

TeamTNT Attacks Cloud Environments

TeamTNT attacks cloud environments with Weave Scope. This report describes the tactics, techniques, and procedures used and how to defend against them.
 | Oct 22, 2020

We have an MDR...do we still need a SIEM?

Explains what MDR and SIEM are, and how they can work together to provide you with a superior cybersecurity solution.
 | Oct 20, 2020

Translating Paper into Trust

Edward Vasko explains how collaboration can lead to security controls tailored to minimize their impact on job performance.
 | Oct 19, 2020

SonicWall Vulnerability may allow denial of service attack

This is a threat report about a critical SonicWall vulnerability tracked as CVE-2020-5135 that can allow a Denial of Service attack.
 | Oct 15, 2020

What Is Extended Detection and Response (XDR) and why is it gaining momentum as a security solution?

Learn what extended detection and response is and how XDR is evolving into the successor to end-point detection and response (EDR) solutions.
 | Oct 14, 2020

What Is MITRE ATT&CK and how is it being used?

This article answers the question, What is MITRE ATT&CK? and explains ways to use ATT&CK daily to protect your environment against adversarial TTPs.
 | Oct 13, 2020

Backdoor targets Content Management Systems (CMS)

This report describes the tactics, techniques, and procedures for backdoor malware with shell capability and targets content management systems.
 | Oct 11, 2020

Latest Phishing Campaign lures Defense and Aerospace Workers with Fake Job Offers

This report outlines the latest phishing campaign targeting defense and aerospace workers and how to protect against it.
Prev 7 8 9 10 11 Next
Cybersecurity Solutions
  • Governance, Risk, + Compliance (GRC)
  • Attack Surface Management (ASM)
  • Managed XDR & SecOps
  • Microsoft Security Solutions
Company
  • About Avertium
  • Partners
  • Leadership Team
  • Careers
  • Resources
  • Contact
  • Privacy and Legal

Sign up for weekly Flash Notices, tips and security news.

Have questions? Give us a call at 877-707-7997.

logo
Avertium Cyber Fusion Centers
Knoxville • Guadalajara

Copyright © 2025 Avertium.
All Rights Reserved. Privacy Policy