Like many buzzwords in the cybersecurity space, XDR is nuanced. While yes, there are XDR platforms out there, it’s important to note that XDR is not just about the technology – it’s about pairing the right tools with the human expertise necessary to make those tools work. This is especially true for mid-market companies who often lack in-house specialization in specific tools. Explore how you can achieve a more proactive and more mature security posture utilizing XDR: https://loom.ly/kiAfCE4 #XDR #FusionMXDR #securityposture
Avertium
Computer and Network Security
Knoxville, Tennessee 7,884 followers
Avertium is a cyber fusion and MXDR leader, delivering security and compliance to mid-market and enterprise customers.
About us
Avertium is a cyber fusion and MXDR leader, delivering comprehensive security and compliance services to mid-market and enterprise customers. Our unique “Assess, Design, Protect” methodology addresses and improves security strategy, reduces attack surface risk, strengthens compliance, and provides continuous threat protection. Avertium maximizes customer security investments and enables customers to focus on growth, innovation, and business outcomes, while assuring that their security infrastructure is resilient and adaptive to evolving threats. That’s why customers trust Avertium to deliver better security, improved compliance, and greater ROI. Avertium is led by Bill Carroll, a security industry veteran, who has previously held executive leadership roles at a variety of successful technology and security companies. For more information and career opportunities, visit https://www.avertium.com/.
- Website
-
https://www.avertium.com
External link for Avertium
- Industry
- Computer and Network Security
- Company size
- 201-500 employees
- Headquarters
- Knoxville, Tennessee
- Type
- Privately Held
- Founded
- 2019
- Specialties
- Security Assessment, Virtual CISO, MXDR, Managed SIEM, EDR, Microsoft Security, HIPAA, PCI, Compliance Assessments, Penetration Testing, Cybersecurity, Information Security, and HITRUST
Locations
-
Primary
1431 Centerpoint Blvd
Suite 150
Knoxville, Tennessee 37932, US
-
3110 N. Central Avenue
Suite D-170
Phoenix, Arizona 85012, US
Employees at Avertium
-
Brian Bilodeau
Driving organizational excellence by transforming teams and processes to deliver top results with proven, pragmatic leadership and innovative…
-
Bill Carroll
-
Bruce McFalls
By fusing together human expertise and a business-first mindset with the right combination of technology and threat intelligence, Avertium delivers a…
-
Alfredo Freyre
Updates
-
PwC’s 2025 Global Digital Trust Insights survey of business and tech executives revealed significant gaps companies must bridge before achieving cyber resilience. Here's what findings stood out to us: https://loom.ly/d6Wo1OI #AssessDesignProtect
-
Over 90% of organizations experienced at least one identity-related incident in the past year. As workforces become more distributed and cybersecurity grows more complex, identity protection often gets overlooked, but it remains a critical security priority. Our new blog explores Microsoft's holistic approach to cybersecurity, focusing on identity protection and MXDR to protect the people behind the screens - check it out: https://loom.ly/ru0gg9c
-
Our Mexico Office is decorated and ready for Day of the Dead, aka Día de los Muertos! 💀💜 Día de los Muertos is a holiday celebrated to honor deceased loved ones and remember them with joy. It is 7-day cycle, starting October 27th, but is traditionally celebrated on November 1st and 2nd. To celebrate, our Mexico team shared Pan de Muerto, which means "Bread of the Dead." It is a traditional bread that symbolizes the cycle of life and death, and is always included in Ofrendas or "offerings" as a way to honor those who have passed and so they can have a taste of what they used to love to eat. We're grateful to learn more about the holiday and share these traditions with our teammates in Mexico. Feliz día de muertos!
-
+2
-
💥 FLASH NOTICE 💥 Threat researchers with Trend Micro recently uncovered attacks leveraging exposed instances of Docker Remote API. Avertium recommends to ensure any instances of Docker Remote Access API's are secure with strong access controls and to monitor your Docker Remote API servers for unusual activity. For IoC's and more details, read the full report: https://loom.ly/tbYwlv0 #threatintelligence #trendmicro #RemoteAPI
Flash Notice: Hackers Exploit Docker API Servers for Crypto Mining Attackers
avertium.com
-
Are you considering a switch to Microsoft Defender for Endpoint? In our latest webinar, Rob Wille, Security Solutions Architect at Avertium, guides you through everything you need to know. Our new blog breaks down all the key points discussed in the webinar. Read it here: https://loom.ly/RJly4S4 Want to watch the webinar instead? You can view the recording here ⏩ https://loom.ly/G4_VcFs #DefenderforEndpoint #EDR #endpointprotection #MicrosoftSecurity #MISA
-
Last week, a task force said in a report that the victor of the 2024 presedential election must resolve cybersecurity regulations, better deter cyberattacks, address the cyber workforce shortage, develop plans with the private sector on critical infrastructure protection, and review how to keep the economy going in the event of major hacks. These immediate priorities help position the United States to maintain the lead in the growing global digital economy, foster innovation, and recognize that cybersecurity now impacts every aspect of American life. Beyond the immediate priorities, here are just some of the other recommendations from the report: 💡 Developing an offensive cyber strategy 💡 Establishing security standards for operational technology and information technology systems in each sector 💡 Creating a national K-12 cybersecurity curriculum You can download the full report here: https://loom.ly/tnNxDek Source: https://loom.ly/rGGmszo #AssessDesignProtect #cyberstrategy #cyberregulations
Presidential Transition Task Force
eng.auburn.edu
-
While some may have a general idea of what phishing is, others may be out of loop when it comes to how many phishing techniques actually exist. This guide provides an in-depth exploration of diverse phishing techniques, including HTTPS phishing, clone phishing, angler phishing, and pop-up phishing. By understanding these tactics and implementing proactive security measures, individuals and organizations can protect themselves against phishing attacks. You can read the guide here: https://loom.ly/8QX1Qhw #phishing #phishingscam #phishingtactics
-
Chief Information Security Officers (CISOs) know more than most that you can advocate for cybersecurity all you want, but getting real buy-in from company leadership is an entirely different challenge. In this current threat landscape, CISOs have an opportunity to position cybersecurity investment as the path to innovation - not a blocker. Download our eBook and start building influence in your organization today ➡️ https://loom.ly/g4ZIQTQ #CISO #mssp #cyberintelligence #cyberlandscape #threatlandscape