News You can Use Archives - Adaptus
data

For real change to take place, businesses and consumers alike need to understand the value of data.

Read More
2019 trends

The New Year has arrived and there’s no better way to start than by going through the past and learning from the experiences small and medium-sized businesses have had. Reports suggest that nearly 70 percent of SMBs have faced cyberattacks like phishing and web-based attacks.

Read More

Welcome to Part 3, of "3 Compelling Reasons to Invest in Cyber Security".  In Part 1, I discussed assessing and prioritizing your organization's risks as well as commencing a risk assessment.  Part 2 involved the importance of assessing your organization's supply chain and including such details within the overall risk assessment.

Read More

The push to move everything into the cloud over the past several years has generated a large number of misconfigured and exposed deployments of various software stacks. This has attracted sophisticated attacks that destroy data or abuse server resources for cryptocurrency mining.

Read More

Internet of Things devices–like smart lightbulbs or ovens or even toilets–are notoriously susceptible to being hacked. But the security problems go much deeper than preventing your average smart fridge from becoming a foot soldier in a botnet army.

Read More

In part 2, I will discuss your organization's supply chain.  Even if your organization's IT network is protected, your supplier may not be!  Why should you encourage the board to take this into consideration?  With today's delicate economy, the stability of the supply chain is also under threat.  An attacked supply chain can potentially be disastrous to profitability, business continuity, and compliance. 

Read More
shutdown

At the moment, many of the Department of Homeland Security employees responsible for civilian cybersecurity efforts, including threat analysis and sharing information with private industry, have been furloughed. But even if the shutdown ends soon, it may scare talented people away from taking government cybersecurity jobs—which are already a struggle to fill.

Read More

Attention Hackers! Demonstrate your ingenuity at the SXSW Hackathon. The sixth annual SXSW Hackathon returns in a buzzy 24-hour marathon stretching from Tuesday, March 12 through Wednesday, March 13! Developers, coders, and tech creatives will collaborate in teams to build tech that addresses the range of media covered at SXSW,  from Music and VR/AR to AI and blockchain. Register here...

Read More
report

The Cybersecurity Strategy Report released on December 7 sidesteps the crises du jour by taking a bigger picture, practical and non-partisan view of what’s going wrong and how to fix things. It seeks to articulate how “traditional information technology (IT) strategies seem largely ineffective at stemming the growing tide of cybersecurity incidents.”

Read More
Stepping out

Successful hacking campaigns used to be all about keeping under the radar. But, for some, making a big splash is now more important than lurking in the shadows.

Read More