Uncategorised Archives - Adaptus

It is also believed that the “1800ForBail” campaign is part of a large-scale campaign, that aims at exploiting newly found flaws in WordPress.

Read More

The transformative ways in which new technologies – particularly artificial intelligence – are being utilized call for deeper discussions around the ethical considerations of these deployments. Depending on the organization and its level of ambition for implementing these technologies, that might even include the need for a chief ethics officer to ensure these issues receive appropriate attention at high levels of the organization.

Read More

There are numerous factors that play into how well a phish will work. While we know that training and technical controls have varying levels of influence that are often dependent upon organization maturity, implementation of tools, and configuration of tools, what is happening in the world around us is just as important.

Read More

This 4-part article is pivotal in helping you justify security investment to protect your organization in 2019.  I will suggest how you can make your case for the investment you need, as well as the key factors the board will be looking for in your case. 

Read More

Attention Hackers! Demonstrate your ingenuity at the SXSW Hackathon. The sixth annual SXSW Hackathon returns in a buzzy 24-hour marathon stretching from Tuesday, March 12 through Wednesday, March 13! Developers, coders, and tech creatives will collaborate in teams to build tech that addresses the range of media covered at SXSW,  from Music and VR/AR to AI and blockchain. Register here...

Read More
cybersecurity policy

When Democrats take control of the House in January,  they’ll have more power to shape the agenda in Washington. While cybersecurity is not always the flashiest talking point during an election, lawmakers positioning themselves for potential committee chairmanships in the next Congress are planning to dig deep on cybersecurity issues in the new year.

Read More
ransomware

CIOs, CISOs (Chief Information Security Officers), and IT security teams need to heighten their awareness and response plans around the ransomware threat. Cyber defense needs to cross boundaries so that every IT worker understands exactly what ransomware is, how it infects organizations, and how to combat it.

Read More

Worried your firm’s cyber-security defenses aren’t up to scratch and bracing yourself to spend big bucks sharpening them up? It’s reasonable to be concerned – hacking activity is on the increase and those responsible continue to up the ante with ever-more-clever attempts to infiltrate corporate networks and steal sensitive company and personal data. Cyber-security investment […]

Read More

There’s no one size fits all plan when it comes to cybersecurity. But having no software or employee protocol is simply too dangerous when cyberattacks are quickly becoming an epidemic in the small business community. It only takes one hasty click for a bug to spread throughout a company’s entire database, don’t let it be yours. 

Read More

CAMP ATTERBURY, Ind. — The Cyber Shield 2018 cybersecurity exercise is part of the National Guard’s ongoing effort to be a versatile capability for governors of all 54 states and territories. About 800 cyber warriors gathered to participate in the Cyber Shield 2018 cybersecurity exercise at Camp Atterbury Ind., May 13, 2018. Cyber Shield gathers soldiers, airmen […]

Read More