How to protect backups from ransomware
CSO–Ransomware is getting smarter, attacking backups to prevent recovery. Prevent this from happening by taking a few simple steps.
Who’s selling SASE and what do you get?
NETWORK WORLD–Secure access services edge is a young, cloud-based architecture that shows promise, but the elements that make it up differ depending on who’s selling…
Supply chain attacks show why you should be wary of third-party providers
CSO–The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.
Cisco Router Vulnerability Puts Network Segmentation at Risk
The network vendor is urging customers to patch, as attackers actively exploit the CDPwn vulnerability.
Intel’s Ice Lake Chips to Enable Confidential Computing on Data Center-Grade Servers
The upcoming 3rd Gen Xeon Scalable processor will widely expand applicability of Intel SGX secure enclaves in data centers.
AI center of excellence: A new engine for driving business transformation
AI centers of excellence can accelerate AI adoption — and organization-wide transformation — by consolidating talent, standardizing platforms, spreading successes across business lines, and uncovering…
Another Gang Hides Ransomware Inside Virtual Machines
The Maze ransomware attack involved a full Windows 7 install and, like in the Ragnar Locker case, was hidden inside an Oracle VirtualBox.
Enterprise analytics benefits of natural language processing
TECHTARGET–As more analytics vendors adopt natural language tools, enterprises may want to think about the benefit the technology provides to their analytics abilities.
How AI Is Used in Data Center Physical Security Today
While there is still a lot of baseless hype around AI, it is already making a real difference in some areas, including physical security.
Zerologon Vulnerability Spurs Rare DHS CISA Emergency Order
The Windows Active Directory vulnerability is severe, and blueprints for exploiting it are open source.
Netwalker, the Powerful New Strain of Ransomware Used Against Equinix
The colocation provider says it’s managed to mitigate successfully. Other victims weren’t so lucky.
Take Off Your Mask and Smile at the AI, Data Center Visitor
How AI-powered facial recognition tech helps data center security, and what benefits and challenges it brings in the midst of a pandemic.
Top 5 predictive analytics use cases in enterprises
TECHTARGET–From marketing to healthcare, looking at past data can be beneficial to forecasting future trends. Read on to understand the most popular use cases for…
What is SASE? A cloud service that marries SD-WAN with security
NETWORK WORLD–Secure access service edge is a Gartner model for streamlining network access, improving security, boosting network performance and reducing the number of vendors and…
IBM, Intel, AMD take different routes to hardware-based encryption
CSO–So-called confidential computing approaches allow data to remain encrypted while in use. That’s best done in hardware, and IBM, AMD and Intel are following different…
Why Some Data Centers Don’t Patch and Why They Should
Despite costly consequences, many data center operators don’t get around to patching serious security vulnerabilities until it’s too late.
Getting started with security automation
CSO–Stressed and stretched, IT security teams look to automation for relief from high volumes of alerts from their detection and response systems. Here’s how three…
Hackers Can Turn Off Your Dell Servers Remotely Using the Newly Found iDRAC Vulnerability
Researchers who found the path transversal vulnerability also found hundreds of exposed servers via the internet.
Why more employees need data literacy skills
TECHTARGET–Encouraging employees to learn data literacy skills can benefit any enterprise. Read on for some of the benefits and resources to take advantage of in…
Confidential Computing, the Next Big Thing Making Cloud Less Scary for Enterprises
Securing data while in use opens doors from the on-prem data center to the cloud for more applications.
Why Google Cloud Turned to AMD to Solve for Runtime Encryption
AMD’s latest server chips enabled better scalability, less lag, and more memory than Intel SGX, the cloud provider said.
California Consumer Privacy Act (CCPA): What you need to know to be compliant
CSO–California’s new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.
Overcoming the top 3 analytics adoption challenges
TECHTARGET–Analytics is a growing part of many businesses. Experts talk about some of the most pressing challenges enterprises may face when implementing new analytics strategies.
9 emerging job roles for the future of AI
Artificial intelligence is fast proving a business differentiator. Here are the key roles and skills you may soon need to fill for your AI A-team.
Hackers Use Java to Hide Malware on the Data Center Network
Code written in Java typically goes undetected by antivirus software, allowing for crippling attacks.
VMware Cloud Director Vulnerability Allows Data Center Takeovers
The vulnerability has been fixed with an upgrade, but unpatched systems risk the deletion of databases and virtual machines, or even having an attacker gain…
New Malware Makes Air-Gapped Data Center Networks Less Bulletproof
An advanced cyberespionage group is designing malware that can “jump” across air gaps, researchers say.
Benefits of embedded BI and customizable analytics
TECHTARGET–Depending on your data needs, embedded analytics from a BI platform or a more custom-built analytics framework may work. Read on for the benefits of…
New Malware Hides Inside Rogue Virtual Machines
Security experts identify a new worrisome threat vector, but not all of them agree it has legs.
8 ways to get more life out of an old SIEM
CSO–Can’t update your old security information and event management system now? Use this advice to maintain its effectiveness.