Blog - Adaptus

Partnership established to bring industry-leading cloud-based antivirus HUB for Salesforce and other cloud-based applications to large enterprises in North America.

Read More

Most malware authors have become lazy in the past few years, copying code and techniques from each other. A few, however, “have invested in really fresh ideas,” building tools that are often difficult to detect by antivirus software and pose challenges to human researchers,” Aleksandra Doniec, malware intelligence analyst at Malwarebytes, tells CSO. Doniec worked […]

Read More

Today, more than 70% of all the attacks Kaspersky Lab catches are targeting Microsoft Office, and only 14% take advantage of browser vulnerabilities. Two years ago, it was the opposite: Web-based vulnerabilities accounted for 45% of the attacks, while Microsoft Office had a 16% share.

Read More

Adaptus is pleased to announce major product enhancements and new capabilities for EZProtect — the industry’s leading antivirus solution for Salesforce. The Spring ‘19 release lays the foundation for a centralized, cybersecurity hub for all cloud-based and on-premise applications for large enterprises.

Read More

Suzanne DiBianca is Chief Impact Officer and EVP of Corporate Relations at Salesforce, where she leads the company’s stakeholder strategy—including all corporate giving, community relations, and sustainability efforts. DiBianca was previously co-founder and president of the Salesforce Foundation and Salesforce.org. Under her leadership, Salesforce pioneered the Pledge 1% model of integrated corporate philanthropy, which dedicates 1% of Salesforce’s equity, employee time or […]

Read More

Monitoring of networks, endpoints, and cloud assets is a continuing cybersecurity challenge for many healthcare organizations, according to CynergisTek’s 2019 annual report. This is bad news because the attack surface at healthcare organizations is rapidly expanding as more systems and devices access their networks, it noted. Particularly disturbing, CynergisTek found that healthcare organizations’ compliance rate with the […]

Read More
air force

The Air Force is refining new cloud-oriented cybersecurity technologies to safeguard vulnerable data networks and strengthen defenses against increasingly sophisticated AI-enabled cyber attacks. Air Force cloud migration, designed to reduce a hardware footprint, enable broader data access and engender greater levels of combat interoperabity, is seeking to benefit from various technical upgrades to keep pace […]

Read More

The patient lying on the emergency room table in front of Paul Pugsley was having a stroke. Time was running out. Pugsley, an emergency medicine resident at Maricopa Medical Center, knew he needed to send the patient for a CT scan. But when Pugsley looked over at the computer screen at the side of the room, […]

Read More

A teenage hacker breaks into NORAD and almost starts a nuclear war. Ronald Reagan was so disturbed by the movie War Games that he signed into law the draconian Computer Fraud and Abuse Act (CFAA), a dog’s breakfast of a law that continues to loom over good-faith security researchers. Other, more lighthearted movies enchant infosec folks with their campy […]

Read More

"Counter to the idea of reducing connections to the internet, the federal workforce is actually moving in the opposite direction with more and more employees working remotely," one official stated.

Read More