Looking Forward to 2022: What To Expect in Cybersecurity
Many of the same threats, delivered faster, and with more automation and efficiency.
Looking Forward to 2022: What To Expect in Cybersecurity Read More »
Many of the same threats, delivered faster, and with more automation and efficiency.
Looking Forward to 2022: What To Expect in Cybersecurity Read More »
Hackers rush to exploit the vulnerability to steal data, deploy ransomware, install back doors, create botnets, mine cryptocurrencies, and conduct other illegal activities.
Enterprises See Exponential Growth in log4jshell Attacks Read More »
The rapid deployment of 5G and edge computing, the transition to work-from-home, combined with accelerating growth of mobile apps, APIs and web services are expanding the attack surface for cyber criminals. Are we prepared?
Trust no one: New technology platforms expand the attack surface Read More »
With this approach, the hardware is owned by the service provider, so upfront capital expenses are replaced by operating expenses. Scaling up and down is easy. And the on-prem-as-a-service provider handles all the installation, maintenance, networking, and other aspects of running a data center
On-prem-as-a-service comes into its own during pandemic Read More »
The Russian state actors behind last year’s SolarWinds attack have been targeting IT resellers and service providers since at least May, according to a Microsoft report.
SolarWinds Hackers Step Up Attacks Against IT Services Firms Read More »
Data center management has permanently changed as a result of the coronavirus pandemic. Read up on how data centers are evolving.
Post-Pandemic, Data Centers Adapt to “New Normal” Read More »
With the rise of work-from-home, SaaS, IoT, cloud, mobile and edge computing, the traditional on-premises identity and authentication systems are becoming obsolete, giving way to cloud identity.
Cloud Identity Is “New Normal” Replacement for On-Prem Tools Read More »
APIs have emerged as a major attack vector, with only 6% of companies reporting no API-related security issues in the past year, according to one report. Find out why API security is so problematic.
API Attacks, Breaches Piling Up Read More »
Businesses are facing staff shortages and budget constraints that impact their ability to maintain security. Cybersecurity automation, including AI-powered intelligent automation, is helping close the gap.
Five Functions That Benefit From Cybersecurity Automation Read More »
When the pandemic hit, enterprises rushed to the new cloud-based networking solutions for remote employees. Now it’s being applied to on-prem data centers and WANs.
SASE Model Proving Value Beyond Remote Work Scenarios Read More »
The U.S. Treasury Department has sanctioned a cryptocurrency exchange for its role in facilitating ransomware payments and issued an advisory to private companies against making such payments.
Paying Hackers’ Ransom Demands Is Getting Harder Read More »
New Azure-based OMIGOD vulnerability is easy to exploit and has already been attacked by Mirai botnet.
OMIGOD Vulnerability Exposes Virtual Machines Running Inside Azure Read More »
DATA CENTER KNOWLEDGE–Microsoft Azure vulnerability, ChaosDB, exposes the fact that enterprises can’t simply trust cloud providers to protect the infrastructure. Experts point to the zero-trust model and ID-based authentication as critical to cloud security strategy.
Zero-Trust Model Gains Luster Following Azure Security Flaw Read More »
Researchers from cloud security firm Wiz reported an Azure vulnerability affecting Cosmos DB that gave them complete access to thousands of Azure customers.
Microsoft Azure Vulnerability ‘Breaks Secure Multitenancy’ Read More »
The $1 trillion spending package includes funds for bolstering cybersecurity posture in critical digital infrastructure.
Taking a Close Look at the $2B for Cybersecurity in the $1T US Infrastructure Bill Read More »