XDR: Tech Stack, Service, Process, or All Three?

extended detection + response

You could ask ten security professionals in a room what eXtended Detection and Response (XDR) is and you would get ten different answers. According to Gartner, “XDR is a unified security incident detection and response platform that automatically collects and correlates data from multiple proprietary security components.” Seems simple, in theory, yet there is so […]

A Zero Trust Network Architecture (ZTNA) POV with Appgate

We, at Avertium, sat down with Chris Scheels, VP of Product Marketing at Appgate, to get his take on Zero Trust, why it’s so hot right now, and how Appgate’s Software-Defined Perimeter (SDP) helps companies accelerate their journey to Zero Trust Network Architecture (ZTNA). What is Zero Trust? What is Appgate SDP and why is […]

July 4th Post Mortem on PrintNightmare and REvil

Cybersecurity is no longer a liberty or a privilege, it is a necessity. Over the course of 2021, there have been over 21,000 confirmed ransomware threats, and as technology continues to advance, so do the capabilities of those who wish to exploit software vulnerabilities to attack companies. The latest noteworthy exploit leveraged a vulnerability in […]

Attack Surface Management vs. Vulnerability Management

asm vs vm

Welcome to Attack Surface Management Over the years, vulnerability management (VM) was performed in conjunction with penetration testing, vulnerability scanning, and web app assessments. These were some of the key players in helping us understand which of our technology assets are susceptible to ransomware threats and identify where the vulnerabilities lie within our organization to […]

You’re Secure – But are Your Vendors? Assessing Third Party Risk

third party risk

This post was guest-written in partnership with Avertium by Bob Maley, CSO at Black Kite. Foreword: Bob Maley on The Left / Right of Bang Approach As Chief Security Officer at Black Kite, there’s a military concept that I regularly apply to cybersecurity and 3rd party risk. It’s called Left of Bang. In any military […]

Reducing Ransomware Risk in Healthcare

mitigating ransomware in healthcare

How much are you willing to pay to get your personal data back? How about hundreds and thousands of personal data records stored in your company? The impacts of the global pandemic have put the healthcare industry at the top of the list for ransomware threats.  In fact, healthcare cyberattacks doubled in 2020, with 28% tied to ransomware.  And the truth is, ransomware is […]

The Rise of RaaS Gangs + What You Need to Know

extended detection + response

Since the beginning of the global pandemic, the FBI’s Internet Crime Complaint Center (IC3) has seen a 300-400% increase in daily cybersecurity complaints – many of which are ransomware-related – as both domestic and international hackers look to take advantage of Americans’ move to less secure, remote working environments. As we move into 2021, ransomware […]

Does CMMC Immunize You to Ransomware?

cmmc ransomware

While ransomware has been around for a while, it has absolutely SURGED in the past year. In part, this is due to the move to work-from-home environments, as well as the emergence of ransomware-as-a-service (RaaS) – which enables less sophisticated cybercriminals to execute a ransomware attack.   Protecting against bad actors in a constantly-evolving threat landscape […]

To CMMC & Beyond: What you can do today to prepare for CMMC tomorrow

cmmc certification

The Cybersecurity Maturity Model Certification (CMMC) is coming – whether you’re ready or not. Today, it’s primarily meant for the Department of Defense (DoD) and its subcontractors, but this comprehensive framework could be coming to an enterprise like yours in the future.  CMMC is a holistic look at cybersecurity. With cybercrime becoming ever more sophisticated, there’s a real need for a change in the way we assess our current state of cybersecurity […]