Blog - Adaptus

In part 2, I will discuss your organization's supply chain.  Even if your organization's IT network is protected, your supplier may not be!  Why should you encourage the board to take this into consideration?  With today's delicate economy, the stability of the supply chain is also under threat.  An attacked supply chain can potentially be disastrous to profitability, business continuity, and compliance. 

Read More

This 4-part article is pivotal in helping you justify security investment to protect your organization in 2019.  I will suggest how you can make your case for the investment you need, as well as the key factors the board will be looking for in your case. 

Read More
shutdown

At the moment, many of the Department of Homeland Security employees responsible for civilian cybersecurity efforts, including threat analysis and sharing information with private industry, have been furloughed. But even if the shutdown ends soon, it may scare talented people away from taking government cybersecurity jobs—which are already a struggle to fill.

Read More

Attention Hackers! Demonstrate your ingenuity at the SXSW Hackathon. The sixth annual SXSW Hackathon returns in a buzzy 24-hour marathon stretching from Tuesday, March 12 through Wednesday, March 13! Developers, coders, and tech creatives will collaborate in teams to build tech that addresses the range of media covered at SXSW,  from Music and VR/AR to AI and blockchain. Register here...

Read More

Security analytics/operations is a big data application, and big data applications are moving to the cloud. CISOs who still distrust the public cloud must face this fact. They will either figure out how to peacefully coexist with cloud-based cybersecurity analytics/operations or be left in the dust. 

Read More
holiday

Over the next few days and weeks, many people will find themselves traveling to visit with friends and family to celebrate.  Use these tips to help stay safe this year.

Read More

An inspector general's report finds unencrypted thumb drives, classified servers without locks on them and unrepaired computer bugs going back to 1990.

Read More
report

The Cybersecurity Strategy Report released on December 7 sidesteps the crises du jour by taking a bigger picture, practical and non-partisan view of what’s going wrong and how to fix things. It seeks to articulate how “traditional information technology (IT) strategies seem largely ineffective at stemming the growing tide of cybersecurity incidents.”

Read More
biometrics

The method is not yet being widely utilized by consumers or enterprises – and for those who are using identification via fingerprint, voice, eye scan or facial recognition, security risks still exist.

Read More
Stepping out

Successful hacking campaigns used to be all about keeping under the radar. But, for some, making a big splash is now more important than lurking in the shadows.

Read More