Cybersecurity Archives - Adaptus
biometrics

The method is not yet being widely utilized by consumers or enterprises – and for those who are using identification via fingerprint, voice, eye scan or facial recognition, security risks still exist.

Read More
Stepping out

Successful hacking campaigns used to be all about keeping under the radar. But, for some, making a big splash is now more important than lurking in the shadows.

Read More
predictions

The good news: advanced security technologies are constantly being brought to market. The not-so-good news: threat actors are not letting that get in the way; witness more intensified and ever more sophisticated attacks.

Read More

For a CISO or CSO to be truly effective, they need access to the central decision-making process and the authority to participate in that process as an independent voice. To truly provide guidance to the organization around the security of its information and assets, you need to be in the executive level decision-making conversations. And not simply as an observer: you need a full vote.

Read More
blacksville shale gas site

Exercises like Liberty Eclipse demonstrate the interdependencies within our nation’s energy infrastructure. They provide critical forums for collaboration and knowledge transfer and allow public and private sector partners to examine their respective roles and responsibilities in a controlled, secured environment.

Read More
cyber puzzle

"When you have an enterprise that needs to secure data, you're leveraging these consumer devices that were never meant to be secured in the first place."

Read More
Brynjolfsson

The digital economy is set to unlock tremendous economic value for countries over time. But a common setback for the use of various new technologies is their vulnerability to hackers. That's because companies and individuals are not taking cybersecurity seriously, according to Erik Brynjolfsson, director at the MIT Initiative on the Digital Economy and a professor at MIT Sloan School

Read More
The Adaptus Team at #DF18

We all know, however, that connectivity comes with a great risk.  As we open our lives by opening to the things around us (aka IoT), it allows negative consequences to lurk just below the surface. For example, walking around #Dreamfest18, my phone was connecting to different booths, devices, and engaging applications. Even my convention badge was connected – all it takes is to be in range and my information is automatically uploaded to that vendor or session.

Read More

But no matter how much attention (or budget) is lavished on cybersecurity, executives need to understand that getting hacked isn’t a matter of if but when. This is the new normal in cybersecurity, and it changes the approach to preparation and risk management.

Read More

The number of cybersecurity choices facing chief information security officers, or CISOs, is truly overwhelming, according to those in the industry, as hundreds of “Best in Show” companies vie for rising corporate security budgets while claiming superiority for their small niche of the sector. The growing pressure to protect customer data, and with it, the company’s reputation, has given way to the idea of a Holy Grail of a central solution for cybersecurity.

Read More