Mary Rose Avila, Author at Adaptus
travel-by-plane

A little over three-quarters (77 percent) of workers say they connect to free or public WiFi while during travel. Some 63 percent will use public WiFi to access work emails and files. Those are just a couple top line findings from a chilling (if predictable) new digital security survey conducted by threat management company ObserveIT. The survey included […]

Read More
cybersecurity policy

When Democrats take control of the House in January,  they’ll have more power to shape the agenda in Washington. While cybersecurity is not always the flashiest talking point during an election, lawmakers positioning themselves for potential committee chairmanships in the next Congress are planning to dig deep on cybersecurity issues in the new year.

Read More
blacksville shale gas site

Exercises like Liberty Eclipse demonstrate the interdependencies within our nation’s energy infrastructure. They provide critical forums for collaboration and knowledge transfer and allow public and private sector partners to examine their respective roles and responsibilities in a controlled, secured environment.

Read More
ransomware

CIOs, CISOs (Chief Information Security Officers), and IT security teams need to heighten their awareness and response plans around the ransomware threat. Cyber defense needs to cross boundaries so that every IT worker understands exactly what ransomware is, how it infects organizations, and how to combat it.

Read More
cyber puzzle

"When you have an enterprise that needs to secure data, you're leveraging these consumer devices that were never meant to be secured in the first place."

Read More
Brynjolfsson

The digital economy is set to unlock tremendous economic value for countries over time. But a common setback for the use of various new technologies is their vulnerability to hackers. That's because companies and individuals are not taking cybersecurity seriously, according to Erik Brynjolfsson, director at the MIT Initiative on the Digital Economy and a professor at MIT Sloan School

Read More
The Adaptus Team at #DF18

We all know, however, that connectivity comes with a great risk.  As we open our lives by opening to the things around us (aka IoT), it allows negative consequences to lurk just below the surface. For example, walking around #Dreamfest18, my phone was connecting to different booths, devices, and engaging applications. Even my convention badge was connected – all it takes is to be in range and my information is automatically uploaded to that vendor or session.

Read More

But no matter how much attention (or budget) is lavished on cybersecurity, executives need to understand that getting hacked isn’t a matter of if but when. This is the new normal in cybersecurity, and it changes the approach to preparation and risk management.

Read More

The number of cybersecurity choices facing chief information security officers, or CISOs, is truly overwhelming, according to those in the industry, as hundreds of “Best in Show” companies vie for rising corporate security budgets while claiming superiority for their small niche of the sector. The growing pressure to protect customer data, and with it, the company’s reputation, has given way to the idea of a Holy Grail of a central solution for cybersecurity.

Read More
Dreamforce18

If you own and are responsible for your company’s Salesforce relationship, make purchasing decisions, negotiate with Salesforce come renewal time, or manage a team of Salesforce users, this is the Dreamforce guide for you. These tips will help you make the most of Dreamforce in the sense that you are laying a path for a stronger, more appropriate and beneficial relationship with Salesforce that can also result in successful renewal negotiations and more competitive pricing and commercial terms.

Read More