Blog - Adaptus

Monitoring of networks, endpoints, and cloud assets is a continuing cybersecurity challenge for many healthcare organizations, according to CynergisTek’s 2019 annual report. This is bad news because the attack surface at healthcare organizations is rapidly expanding as more systems and devices access their networks, it noted. Particularly disturbing, CynergisTek found that healthcare organizations’ compliance rate with the […]

Read More
air force

The Air Force is refining new cloud-oriented cybersecurity technologies to safeguard vulnerable data networks and strengthen defenses against increasingly sophisticated AI-enabled cyber attacks. Air Force cloud migration, designed to reduce a hardware footprint, enable broader data access and engender greater levels of combat interoperabity, is seeking to benefit from various technical upgrades to keep pace […]

Read More

The patient lying on the emergency room table in front of Paul Pugsley was having a stroke. Time was running out. Pugsley, an emergency medicine resident at Maricopa Medical Center, knew he needed to send the patient for a CT scan. But when Pugsley looked over at the computer screen at the side of the room, […]

Read More

A teenage hacker breaks into NORAD and almost starts a nuclear war. Ronald Reagan was so disturbed by the movie War Games that he signed into law the draconian Computer Fraud and Abuse Act (CFAA), a dog’s breakfast of a law that continues to loom over good-faith security researchers. Other, more lighthearted movies enchant infosec folks with their campy […]

Read More

"Counter to the idea of reducing connections to the internet, the federal workforce is actually moving in the opposite direction with more and more employees working remotely," one official stated.

Read More

The True Cost of Free WiFi Ease-of-access is a true double-edged sword. Like all powerful technologies, WiFi (public WiFi in particular) can be easily exploited. You may have read about attacks on publicly accessible WiFi networks, yet studies show that more than 70% of participants admit to accessing their personal email through public WiFi. WiFi vulnerabilities aren’t […]

Read More

Is that security trend hot or not? From tools and technologies to threats, tactics, and training, the numbers don't lie.

Read More
data

For real change to take place, businesses and consumers alike need to understand the value of data.

Read More
2019 trends

The New Year has arrived and there’s no better way to start than by going through the past and learning from the experiences small and medium-sized businesses have had. Reports suggest that nearly 70 percent of SMBs have faced cyberattacks like phishing and web-based attacks.

Read More

An average of 5,000 to 7,000 new computer security threats are announced each year. Here's how to defend against them more effectively and efficiently.

Read More