© 2017 Advanced Threat Analysis

January 11, 2016

EMC builds information infrastructures and virtual infrastructures to help people and businesses around the world unleash the power of their digital information. EMC offerings in backup and recovery, enterprise content management, unified storage, big data, enterprise...

August 29, 2015

August 26, 2015– New York, NY – John R. Betancourt, CEO & President of Intelleges announced today that Intelleges signed a strategic alliance agreement today with cybersecurity firm Advanced Threat Analysis.

 

Intelleges Secured Organized Communication System (SOCS) is a...

February 22, 2015

On February 18, 2015, ATA collaborated with the Anne Arundel Workforce Development Corporation (AAWDC) and other local companies on the first CyberWorks Candidate Convention conducted at the Chesapeake Innovation Center in Odenton, MD.

 

 

ATA and other industry related c...

November 14, 2014

The Masque Attack

 

OS X/iOS has was the target recently of what has been referred to as "The Masque Attack." This attack tricks victims into installing malicious apps from third-party app stores, such as Cydia (an unofficial iOS app store available to jailbroken iOS dev...

November 9, 2014

President and CEO Roger Colón recently met with Dynamic Trading Exchange Technologies (DTXT Corporation) to develop a partnership to support the Mexican IRS. ATA will be traveling to Mexico City this week to build this relationship and expand our presence in the Cyber...

August 26, 2014

The Spanish American Civic Association (SACA) has always been committed to the empowerment of the Latin community through a self-help and self-development process. SACA is dedicated to the Latin community in Lancaster, PA, and our founder and CEO, Mr. Roger Colón had a...

July 28, 2014

Have you been receiving E-Mails stating that you are about to receive a package or delivery, maybe from UPS or FedEx? Well if you do see one, just delete it. If you do open it up, PLEASE DON’T click on the link. If you do, ALLLL of your files are going to be encrypted...

July 25, 2014

With all of the information security conferences that exist today - RSA, Blackhat, Defcon, Shmoocon, Infosec, etc., which one holds the most value and which one should I attend? Let’s break it down into three categories. Content. Money. Play time.

 

 

With all of the info...

Please reload

Featured Posts

EMC builds information infrastructures and virtual infrastructures to help people and businesses around the world unleash the power of their digital i...

EMC and Advanced Threat Analysis team up.

January 11, 2016

1/1
Please reload

Recent Posts

November 9, 2014

Please reload

Archive
Please reload

Follow Us
  • Facebook Basic Square
  • Twitter Basic Square
  • LinkedIn App Icon