All recent articles

How to protect backups from ransomware

Nov 2, 2020

CSO–Ransomware is getting smarter, attacking backups to prevent recovery. Prevent this from happening by taking a few simple steps.

Who’s selling SASE and what do you get?

Oct 30, 2020

NETWORK WORLD–Secure access services edge is a young, cloud-based architecture that shows promise, but the elements that make it up differ depending on who’s selling…

Supply chain attacks show why you should be wary of third-party providers

Oct 29, 2020

CSO–The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

Cisco Router Vulnerability Puts Network Segmentation at Risk

Oct 27, 2020

The network vendor is urging customers to patch, as attackers actively exploit the CDPwn vulnerability.

Intel’s Ice Lake Chips to Enable Confidential Computing on Data Center-Grade Servers

Oct 15, 2020

The upcoming 3rd Gen Xeon Scalable processor will widely expand applicability of Intel SGX secure enclaves in data centers.

AI center of excellence: A new engine for driving business transformation

Oct 8, 2020

AI centers of excellence can accelerate AI adoption — and organization-wide transformation — by consolidating talent, standardizing platforms, spreading successes across business lines, and uncovering…

Another Gang Hides Ransomware Inside Virtual Machines

Oct 6, 2020

The Maze ransomware attack involved a full Windows 7 install and, like in the Ragnar Locker case, was hidden inside an Oracle VirtualBox.

Enterprise analytics benefits of natural language processing

Oct 5, 2020

TECHTARGET–As more analytics vendors adopt natural language tools, enterprises may want to think about the benefit the technology provides to their analytics abilities.

How AI Is Used in Data Center Physical Security Today

Sep 28, 2020

While there is still a lot of baseless hype around AI, it is already making a real difference in some areas, including physical security.

Zerologon Vulnerability Spurs Rare DHS CISA Emergency Order

Sep 22, 2020

The Windows Active Directory vulnerability is severe, and blueprints for exploiting it are open source.

Netwalker, the Powerful New Strain of Ransomware Used Against Equinix

Sep 21, 2020

The colocation provider says it’s managed to mitigate successfully. Other victims weren’t so lucky.

Take Off Your Mask and Smile at the AI, Data Center Visitor

Sep 14, 2020

How AI-powered facial recognition tech helps data center security, and what benefits and challenges it brings in the midst of a pandemic.

Top 5 predictive analytics use cases in enterprises

Sep 10, 2020

TECHTARGET–From marketing to healthcare, looking at past data can be beneficial to forecasting future trends. Read on to understand the most popular use cases for…

What is SASE? A cloud service that marries SD-WAN with security

Sep 9, 2020

NETWORK WORLD–Secure access service edge is a Gartner model for streamlining network access, improving security, boosting network performance and reducing the number of vendors and…

IBM, Intel, AMD take different routes to hardware-based encryption

Aug 24, 2020

CSO–So-called confidential computing approaches allow data to remain encrypted while in use. That’s best done in hardware, and IBM, AMD and Intel are following different…

Why Some Data Centers Don’t Patch and Why They Should

Aug 20, 2020

Despite costly consequences, many data center operators don’t get around to patching serious security vulnerabilities until it’s too late.

Getting started with security automation

Aug 14, 2020

CSO–Stressed and stretched, IT security teams look to automation for relief from high volumes of alerts from their detection and response systems. Here’s how three…

Hackers Can Turn Off Your Dell Servers Remotely Using the Newly Found iDRAC Vulnerability

Aug 5, 2020

Researchers who found the path transversal vulnerability also found hundreds of exposed servers via the internet.

Why more employees need data literacy skills

Aug 4, 2020

TECHTARGET–Encouraging employees to learn data literacy skills can benefit any enterprise. Read on for some of the benefits and resources to take advantage of in…

Confidential Computing, the Next Big Thing Making Cloud Less Scary for Enterprises

Jul 30, 2020

Securing data while in use opens doors from the on-prem data center to the cloud for more applications.

Why Google Cloud Turned to AMD to Solve for Runtime Encryption

Jul 21, 2020

AMD’s latest server chips enabled better scalability, less lag, and more memory than Intel SGX, the cloud provider said.

California Consumer Privacy Act (CCPA): What you need to know to be compliant

Jul 7, 2020

CSO–California’s new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.

Overcoming the top 3 analytics adoption challenges

Jul 2, 2020

TECHTARGET–Analytics is a growing part of many businesses. Experts talk about some of the most pressing challenges enterprises may face when implementing new analytics strategies.

9 emerging job roles for the future of AI

Jul 2, 2020

Artificial intelligence is fast proving a business differentiator. Here are the key roles and skills you may soon need to fill for your AI A-team.

Hackers Use Java to Hide Malware on the Data Center Network

Jun 22, 2020

Code written in Java typically goes undetected by antivirus software, allowing for crippling attacks.

VMware Cloud Director Vulnerability Allows Data Center Takeovers

Jun 15, 2020

The vulnerability has been fixed with an upgrade, but unpatched systems risk the deletion of databases and virtual machines, or even having an attacker gain…

New Malware Makes Air-Gapped Data Center Networks Less Bulletproof

Jun 8, 2020

An advanced cyberespionage group is designing malware that can “jump” across air gaps, researchers say.

Benefits of embedded BI and customizable analytics

Jun 8, 2020

TECHTARGET–Depending on your data needs, embedded analytics from a BI platform or a more custom-built analytics framework may work. Read on for the benefits of…

New Malware Hides Inside Rogue Virtual Machines

Jun 2, 2020

Security experts identify a new worrisome threat vector, but not all of them agree it has legs.

8 ways to get more life out of an old SIEM

Jun 1, 2020

CSO–Can’t update your old security information and event management system now? Use this advice to maintain its effectiveness.