Blog - Adaptus

Welcome to Part 3, of "3 Compelling Reasons to Invest in Cyber Security".  In Part 1, I discussed assessing and prioritizing your organization's risks as well as commencing a risk assessment.  Part 2 involved the importance of assessing your organization's supply chain and including such details within the overall risk assessment.

Read More

The push to move everything into the cloud over the past several years has generated a large number of misconfigured and exposed deployments of various software stacks. This has attracted sophisticated attacks that destroy data or abuse server resources for cryptocurrency mining.

Read More

Internet of Things devices–like smart lightbulbs or ovens or even toilets–are notoriously susceptible to being hacked. But the security problems go much deeper than preventing your average smart fridge from becoming a foot soldier in a botnet army.

Read More

In part 2, I will discuss your organization's supply chain.  Even if your organization's IT network is protected, your supplier may not be!  Why should you encourage the board to take this into consideration?  With today's delicate economy, the stability of the supply chain is also under threat.  An attacked supply chain can potentially be disastrous to profitability, business continuity, and compliance. 

Read More

This 4-part article is pivotal in helping you justify security investment to protect your organization in 2019.  I will suggest how you can make your case for the investment you need, as well as the key factors the board will be looking for in your case. 

Read More
shutdown

At the moment, many of the Department of Homeland Security employees responsible for civilian cybersecurity efforts, including threat analysis and sharing information with private industry, have been furloughed. But even if the shutdown ends soon, it may scare talented people away from taking government cybersecurity jobs—which are already a struggle to fill.

Read More

Attention Hackers! Demonstrate your ingenuity at the SXSW Hackathon. The sixth annual SXSW Hackathon returns in a buzzy 24-hour marathon stretching from Tuesday, March 12 through Wednesday, March 13! Developers, coders, and tech creatives will collaborate in teams to build tech that addresses the range of media covered at SXSW,  from Music and VR/AR to AI and blockchain. Register here...

Read More

Security analytics/operations is a big data application, and big data applications are moving to the cloud. CISOs who still distrust the public cloud must face this fact. They will either figure out how to peacefully coexist with cloud-based cybersecurity analytics/operations or be left in the dust. 

Read More
holiday

Over the next few days and weeks, many people will find themselves traveling to visit with friends and family to celebrate.  Use these tips to help stay safe this year.

Read More

An inspector general's report finds unencrypted thumb drives, classified servers without locks on them and unrepaired computer bugs going back to 1990.

Read More