• ®
  • About
    • About Us

      Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.

      Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.

    • Leadership
    • Careers
  • Solutions

    Governance, Risk & Compliance

    • Compliance Audit & Risk Assessment
    • Compliance Program Development
    • Continuous Compliance & Policy Management

    Attack Surface Management

    • Tool Consolidation & Optimization
    • Configuration & Deployment
    • Testing & Exposure

    Managed XDR & SecOps

    • Fusion MXDR
    • Configuration & Managed Services

    Microsoft Security Solutions

    • Threat Protection & Cloud Security
    • Data Security, Compliance & Privacy
    • Identity & Endpoint Management
    • AI Safety & Security
    • Microsoft Security Foundations
  • Partners
  • News & Resources
    • All resources
    • Flash-Notices
    • Blogs
    • Webinars

    Latest resource

    Building Trust Over Time: SOC 2 and the Importance of Annual Audits

    Business relationships are founded on trust, and in today’s digital world, trust around data security is especially critical.

    Learn more
  • Contact
    • About Us
    • Leadership
    • Careers
  • Governance, Risk & Compliance

    • Compliance Audit & Risk Assessment
    • Compliance Program Development
    • Continuous Compliance & Policy Management

    Attack Surface Management

    • Tool Consolidation & Optimization
    • Configuration & Deployment
    • Testing & Exposure

    Managed XDR & SecOps

    • Fusion MXDR
    • Configuration & Managed Services

    Microsoft Security Solutions

    • Threat Protection & Cloud Security
    • Data Security, Compliance & Privacy
    • Identity & Endpoint Management
    • AI Safety & Security
    • Microsoft Security Foundations
  • Partners
    • All resources
    • Flash-Notices
    • Blogs
    • Webinars
  • Contact

Avertium Blog

 | Feb 16, 2020

Updates on North Korea's HIDDEN COBRA

This report shows the latest updates on HIDDEN COBRA malware toolsets including ARTFULPIE, CROWDEDFLOUNDER, HOTCROISSANT, HOPLIGHT, and SLICKSHOES.
 | Feb 10, 2020

CDPwn: Five Cisco Vulnerabilities

This threat report is about CDPwn, the collective name for five major Cisco vulnerabilities affecting a multitude of the company's products.
 | Jan 29, 2020

5 Steps to Recovering from a failed PCI ROC

Failing a PCI ROC doesn’t mean the end of your ability to do business. Our PCI QSAs provides five steps to recovering from a failed ROC.
 | Jan 21, 2020

The ABCs of CVE-2020-0601

In this article, we will discuss what you need to know about CVE-2020-0601 and the Windows Crypt32.dll vulnerability.
 | Jan 20, 2020

3 ways to optimize your existing Cybersecurity Investment

Learn how optimizing your current cybersecurity investment pays better dividends than spending on additional tools and helps to protect against cybercrime.
 | Jan 16, 2020

Citrix CVE-2019-19781: The Facts

What you need to know about the Citrix vulnerability CVE-2019-19781 if your environment is affected and the mitigation steps to take.
 | Jan 15, 2020

Using Deception Against Pass-the-Hash Attacks

Learn how to use deception against pass-the-hash attacks to subtly guide even experienced attackers away from data and where you want them to go.
 | Jan 9, 2020

Deception in Cyber Defense in Layman's Terms

This is an introduction to the use of deception as a defensive mechanism in cybersecurity. It includes the use of honey pots in cyber defense.
 | Jan 8, 2020

Dealing with a Discovered Vulnerability

The active threat landscape means that dealing with a discovered vulnerability may move to the top of your to-do list this year. Learn what to do.
 | Jan 6, 2020

Enterprise Grade Malware JsOutProx

An overview of the enterprise-grade malware dubbed JsOutProx which targets Windows.
Prev 18 19 20 21 22 Next
Cybersecurity Solutions
  • Governance, Risk, + Compliance (GRC)
  • Attack Surface Management (ASM)
  • Managed XDR & SecOps
  • Microsoft Security Solutions
Company
  • About Avertium
  • Partners
  • Leadership Team
  • Careers
  • Resources
  • Contact
  • Privacy and Legal

Sign up for weekly Flash Notices, tips and security news.

Have questions? Give us a call at 877-707-7997.

logo
Avertium Cyber Fusion Centers
Arizona • Tennessee

Copyright © 2025 Avertium.
All Rights Reserved. Privacy Policy