Cybersecurity Archives - Adaptus

An average of 5,000 to 7,000 new computer security threats are announced each year. Here's how to defend against them more effectively and efficiently.

Read More

The push to move everything into the cloud over the past several years has generated a large number of misconfigured and exposed deployments of various software stacks. This has attracted sophisticated attacks that destroy data or abuse server resources for cryptocurrency mining.

Read More

Security analytics/operations is a big data application, and big data applications are moving to the cloud. CISOs who still distrust the public cloud must face this fact. They will either figure out how to peacefully coexist with cloud-based cybersecurity analytics/operations or be left in the dust. 

Read More
biometrics

The method is not yet being widely utilized by consumers or enterprises – and for those who are using identification via fingerprint, voice, eye scan or facial recognition, security risks still exist.

Read More
Stepping out

Successful hacking campaigns used to be all about keeping under the radar. But, for some, making a big splash is now more important than lurking in the shadows.

Read More
predictions

The good news: advanced security technologies are constantly being brought to market. The not-so-good news: threat actors are not letting that get in the way; witness more intensified and ever more sophisticated attacks.

Read More

For a CISO or CSO to be truly effective, they need access to the central decision-making process and the authority to participate in that process as an independent voice. To truly provide guidance to the organization around the security of its information and assets, you need to be in the executive level decision-making conversations. And not simply as an observer: you need a full vote.

Read More
blacksville shale gas site

Exercises like Liberty Eclipse demonstrate the interdependencies within our nation’s energy infrastructure. They provide critical forums for collaboration and knowledge transfer and allow public and private sector partners to examine their respective roles and responsibilities in a controlled, secured environment.

Read More
cyber puzzle

"When you have an enterprise that needs to secure data, you're leveraging these consumer devices that were never meant to be secured in the first place."

Read More
Brynjolfsson

The digital economy is set to unlock tremendous economic value for countries over time. But a common setback for the use of various new technologies is their vulnerability to hackers. That's because companies and individuals are not taking cybersecurity seriously, according to Erik Brynjolfsson, director at the MIT Initiative on the Digital Economy and a professor at MIT Sloan School

Read More