• ®
  • About
    • About Us

      Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.

      Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.

    • Leadership
    • Careers
  • Solutions

    Governance, Risk & Compliance

    • Compliance Audit & Risk Assessment
    • Compliance Program Development
    • Continuous Compliance & Policy Management

    Attack Surface Management

    • Tool Consolidation & Optimization
    • Configuration & Deployment
    • Pen Testing & Exposure
    • Advisory Services

    Managed XDR & SecOps

    • Fusion MXDR
    • Configuration & Managed Services

    Microsoft Security Solutions

    • Threat Protection & Cloud Security
    • Data Security, Compliance & Privacy
    • Identity & Endpoint Management
    • AI Safety & Security
    • Microsoft Security Foundations
  • Partners
  • News & Resources
    • All resources
    • Flash-Notices
    • Blogs
    • Webinars

    Latest resource

    Building Trust Over Time: SOC 2 and the Importance of Annual Audits

    Business relationships are founded on trust, and in today’s digital world, trust around data security is especially critical.

    Learn more
  • Contact
    • About Us
    • Leadership
    • Careers
  • Governance, Risk & Compliance

    • Compliance Audit & Risk Assessment
    • Compliance Program Development
    • Continuous Compliance & Policy Management

    Attack Surface Management

    • Tool Consolidation & Optimization
    • Configuration & Deployment
    • Pen Testing & Exposure
    • Advisory Services

    Managed XDR & SecOps

    • Fusion MXDR
    • Configuration & Managed Services

    Microsoft Security Solutions

    • Threat Protection & Cloud Security
    • Data Security, Compliance & Privacy
    • Identity & Endpoint Management
    • AI Safety & Security
    • Microsoft Security Foundations
  • Partners
    • All resources
    • Flash-Notices
    • Blogs
    • Webinars
  • Contact

Avertium Blog

 | Aug 24, 2021

Threat Actor Profile – “BlackMatter” Ransomware

BlackMatter began making its presence known as a ransomware-as-a-service (RaaS) gang in 2021. Read more for indicators of compromise and our recommendations.
 | Aug 18, 2021

Email Phishing Campaigns (Beware Of These Scams)

We discuss the similarities between Photo Copyright email phishing campaigns and SharePoint phishing campaigns. Learn more!
 | Aug 10, 2021

XDR: Tech Stack, Service, Process, or All Three?

What is eXtended Detection Response (XDR)? Is it a process, a tech stack, or a service? How does it differ from MDR and EDR?
 | Aug 3, 2021

Microsoft Exchange Server Breach is Formally Attributed to China by the U.S

The extensive breach of Microsoft Exchange Server early this year has been formally attributed to China by the United States & several allies.
 | Aug 3, 2021

President Biden’s Executive Order on Cybersecurity: What it does & What it doesn’t do

The growing need for cybersecurity has brought onto a new executive order. Read more to learn about what this means and where it falls short.
 | Jul 28, 2021

A Zero Trust Network Architecture (ZTNA) POV with Appgate

As Zero Trust becomes more relevant, Appgate x Avertium leads the way in accelerating the customer's Zero Trust journey.
 | Jul 22, 2021

July 4th Post Mortem on PrintNightmare and REvil

The latest noteworthy exploit leveraged a vulnerability in Microsoft’s Print Spooler Service to target IT Solutions company, Kaseya.
 | Jul 7, 2021

Summary of the International Institute for Strategic Studies’ Nation-State Cyber Power Assessment

A recent study, conducted by the International Institute for Strategic Studies, assessed the cyber power of 15 different nation-states.
 | Jul 1, 2021

CobaltStrike Overview

This report is about the use of the well-known tool CobaltStrike in adversarial campaigns, CobaltStrike dates all the way back to 2016.
 | Jun 28, 2021

Attack Surface Management vs. Vulnerability Management

Today's attack surface management extends beyond your physical IT assets, now encompassing your entire digital footprint, and vulnerability management focus on software and code-based variabilities.
Prev 4 5 6 7 8 Next
Cybersecurity Solutions
  • Governance, Risk, + Compliance (GRC)
  • Attack Surface Management (ASM)
  • Managed XDR & SecOps
  • Microsoft Security Solutions
Company
  • About Avertium
  • Partners
  • Leadership Team
  • Careers
  • Resources
  • Contact
  • Privacy and Legal

Sign up for weekly Flash Notices, tips and security news.

Have questions? Give us a call at 877-707-7997.

logo
Avertium Cyber Fusion Centers
Knoxville • Guadalajara

Copyright © 2025 Avertium.
All Rights Reserved. Privacy Policy