Government organizations’ readiness in the face of cyber threats

Cyber threats targeting government organizations have become increasingly sophisticated, posing significant risks to national security, public infrastructure, and sensitive data. These threats are diverse in nature, originating from various actors such… Continue reading Government organizations’ readiness in the face of cyber threats

Avertium Fusion MXD strengthens threat defense intelligence for Microsoft Security customers

Avertium announced Fusion MXDR, a new service the security partner is providing for Microsoft Security customers. This threat-informed, managed extended detection and response (MXDR) service from Avertium includes threat intelligence, attack surface mo… Continue reading Avertium Fusion MXD strengthens threat defense intelligence for Microsoft Security customers

How is the U.S. government preparing for critical infrastructure attacks?

Russia’s invasion on Ukraine has put a spotlight on threats to critical infrastructure, which thus far have been mostly physical, impacting water treatment, electricity, and nuclear plants. These threats to critical infrastructure may seem distan… Continue reading How is the U.S. government preparing for critical infrastructure attacks?

With remote working on the rise, infosec strategies need to evolve

The recent pandemic created a new normal that redefines the way business operates by eliminating security and physical work borders. An Avertium study found that having employees work from home during the pandemic saved U.S. employers more than $30 bil… Continue reading With remote working on the rise, infosec strategies need to evolve

People are the very first element in a pragmatic cybersecurity strategy

39 percent of cybersecurity and IT executives indicate their company is under-prepared to handle a data breach and 66 percent prefer negotiating with a used car salesperson over dealing with a breach, according to Avertium survey. The survey brings to … Continue reading People are the very first element in a pragmatic cybersecurity strategy