Cybersecurity Archives - Adaptus
cyber puzzle

"When you have an enterprise that needs to secure data, you're leveraging these consumer devices that were never meant to be secured in the first place."

Read More
Brynjolfsson

The digital economy is set to unlock tremendous economic value for countries over time. But a common setback for the use of various new technologies is their vulnerability to hackers. That's because companies and individuals are not taking cybersecurity seriously, according to Erik Brynjolfsson, director at the MIT Initiative on the Digital Economy and a professor at MIT Sloan School

Read More
The Adaptus Team at #DF18

We all know, however, that connectivity comes with a great risk.  As we open our lives by opening to the things around us (aka IoT), it allows negative consequences to lurk just below the surface. For example, walking around #Dreamfest18, my phone was connecting to different booths, devices, and engaging applications. Even my convention badge was connected – all it takes is to be in range and my information is automatically uploaded to that vendor or session.

Read More

But no matter how much attention (or budget) is lavished on cybersecurity, executives need to understand that getting hacked isn’t a matter of if but when. This is the new normal in cybersecurity, and it changes the approach to preparation and risk management.

Read More

The number of cybersecurity choices facing chief information security officers, or CISOs, is truly overwhelming, according to those in the industry, as hundreds of “Best in Show” companies vie for rising corporate security budgets while claiming superiority for their small niche of the sector. The growing pressure to protect customer data, and with it, the company’s reputation, has given way to the idea of a Holy Grail of a central solution for cybersecurity.

Read More
darknet

The dark component of the deep web is the primary highway for the exchange and commerce among cybercriminal groups. In fact, very few cybercriminals work alone. Eighty percent of cybercrime is linked to criminal collectives, and stolen data-shaped goods surface rapidly on darknet forums and marketplaces following cybersecurity incidents with data loss. Adapting to these trends is essential. […]

Read More
IoT

Internet of Things (IoT) devices including routers, IP cameras and even smart locks and connected doors are being targeted by cyber criminals who are looking to exploit them as a gateway for hacking and other cyber attacks, the FBI has warned. An alert from the FBI details the dangers of unsecured smart IoT devices and how they can be abused by attackers, […]

Read More

Medical testing laboratory firm LabCorp is still working to fully recover systems functionality nearly a week after a cyberattack that the company now claims involved "a new variant" of ransomware.

Read More
Mining Malware

Mining malware may now be painfully familiar to anyone with even a passing awareness of cryptocurrency, but so far businesses and consumers alike are failing to significantly curb its growing threat. On May 14, Israeli cybersecurity firm Check Point released its latest Global Threat Index, and for the fifth consecutive month it found that the Coinhive […]

Read More

Election meddling. Corporate espionage. Ransomware attacks. Massive data breaches. The cybersecurity threats facing the United States seem to multiply by the year, leaving government agencies and private companies scrambling to keep up. That is among the reasons why many experts are alarmed that the White House eliminated the position of cybersecurity czar on the National Security Council on Tuesday. […]

Read More