News & Blog

CRN Recognizes Atlantic Data Security on 2022 Solution Provider 500 List


Hartford, CT, June 1, 2022 — Atlantic Data Security today announced that CRN®, a brand of The Channel Company, has...

Award Press Release

Atlantic Data Security continues its investment to accelerate market expansion with the appointment of Scott Kasper as Executive Vice President and General Manager


Hartford Conn., May 26th, 2022, Atlantic Data Security, A leading Security Consulting Firm, today announced the promotion of Scott Kasper...


Apple's Zero-Day Vulnerabilities


Apple has long enjoyed a reputation for being secure, with fewer hackers targeting users on those platforms, and well-designed software...

Threat Mitigation

49ers’ Attacked by Ransomware


After the big game last night, I was expecting a lull in the football news for the next few months. ...

Blog Threat Mitigation

Skybox Security Partner of the the Year Award: Press Release


Atlantic Data Security wins Skybox Security Partner Award 2021 Atlantic Data Security is recognized for delivering large-scale, business-critical cybersecurity implementations...


A Year of Breaches


By Florian Riederer I hope you all have had refreshing holidays and a good start to the new year. While...

Assessments Blog Threat Mitigation

Atlantic Data Security Log4j Resource Guide


In light of the publicly announced CVE-2021-44228, also known as Log4j, ADS has proactively gathered some resources in an attempt...

Threat Mitigation

Breaking Down the MITRE ATT&CK Framework


You can’t spend too long working in the cyber security space without hearing about the MITRE ATT&CK framework. First released...

Assessments Award Servers Threat Mitigation

CIO Review: Most Promising Cybersecurity Solutions Provider 2021


We are extremely excited to announce that CIO Review Magazine has named Atlantic Data Security one of the 20 Most Promising...

Award Threat Mitigation

Understaffed and Overwhelmed


Understaffed and Overwhelmed; How to improve your security posture when you can’t find the talent you want. by Florian Riederer...

Threat Mitigation

Detection and Response: Endpoint and Extended


​Changing threat landscapes and changing business needs continuously require new security approaches that address evolving needs. One of the most...

Threat Mitigation

IoT Attacks


by Florian Riederer From smartphones, smartwatches, connected cars, networked wearable medical devices, and so on, the highly connected world we...

Threat Mitigation

Request a Meeting with Us
Skip to content