Looking Forward to 2022: What To Expect in Cybersecurity
Many of the same threats, delivered faster, and with more automation and efficiency.
Enterprises See Exponential Growth in log4jshell Attacks
Hackers rush to exploit the vulnerability to steal data, deploy ransomware, install back doors, create botnets, mine cryptocurrencies, and conduct other illegal activities.
Trust no one: New technology platforms expand the attack surface
The rapid deployment of 5G and edge computing, the transition to work-from-home, combined with accelerating growth of mobile apps, APIs and web services are expanding…
On-prem-as-a-service comes into its own during pandemic
With this approach, the hardware is owned by the service provider, so upfront capital expenses are replaced by operating expenses. Scaling up and down is…
SolarWinds Hackers Step Up Attacks Against IT Services Firms
The Russian state actors behind last year’s SolarWinds attack have been targeting IT resellers and service providers since at least May, according to a Microsoft…
Post-Pandemic, Data Centers Adapt to “New Normal”
Data center management has permanently changed as a result of the coronavirus pandemic. Read up on how data centers are evolving.
Cloud Identity Is “New Normal” Replacement for On-Prem Tools
With the rise of work-from-home, SaaS, IoT, cloud, mobile and edge computing, the traditional on-premises identity and authentication systems are becoming obsolete, giving way to…
API Attacks, Breaches Piling Up
APIs have emerged as a major attack vector, with only 6% of companies reporting no API-related security issues in the past year, according to one…
Five Functions That Benefit From Cybersecurity Automation
Businesses are facing staff shortages and budget constraints that impact their ability to maintain security. Cybersecurity automation, including AI-powered intelligent automation, is helping close the…
SASE Model Proving Value Beyond Remote Work Scenarios
When the pandemic hit, enterprises rushed to the new cloud-based networking solutions for remote employees. Now it’s being applied to on-prem data centers and WANs.
Paying Hackers’ Ransom Demands Is Getting Harder
The U.S. Treasury Department has sanctioned a cryptocurrency exchange for its role in facilitating ransomware payments and issued an advisory to private companies against making…
OMIGOD Vulnerability Exposes Virtual Machines Running Inside Azure
New Azure-based OMIGOD vulnerability is easy to exploit and has already been attacked by Mirai botnet.
Zero-Trust Model Gains Luster Following Azure Security Flaw
DATA CENTER KNOWLEDGE–Microsoft Azure vulnerability, ChaosDB, exposes the fact that enterprises can’t simply trust cloud providers to protect the infrastructure. Experts point to the zero-trust…
Microsoft Azure Vulnerability ‘Breaks Secure Multitenancy’
Researchers from cloud security firm Wiz reported an Azure vulnerability affecting Cosmos DB that gave them complete access to thousands of Azure customers.
Taking a Close Look at the $2B for Cybersecurity in the $1T US Infrastructure Bill
The $1 trillion spending package includes funds for bolstering cybersecurity posture in critical digital infrastructure.
Why CISA’s China Cyberattack Playbook Is Worthy of Your Attention
The advisory outlines the tactics, techniques, and procedures China’s state-sponsored cybercriminals use to breach networks.
The Kaseya Ransomware Attack Is a Wakeup Call for MSP-Reliant IT Shops
DATA CENTER KNOWLEDGE–The pandemic has driven more outsourcing to MSPs, making them prime targets for cybercriminals wanting to scale their attacks.
Security Problems Worsen as Enterprises Build Hybrid and Multicloud Systems
DATA CENTER KNOWLEDGE–Under pressure to accelerate cloud adoption, IT orgs often skip over crucial security planning steps.
Pressure Grows for Federal Data Breach Legislation
DATA CENTER KNOWLEDGE–Even as cybersecurity grows in importance as a national priority, individual states continue to push ahead with their own data breach legislation, making…
Russian Cybercrime: Is Extradition Ahead?
DATA CENTER KNOWLEDGE–Russia has long been the world’s biggest haven for cybercrime. On Sunday, Russian President Vladimir Putin said that this would change. But will…
Is the US Government Doing Enough About Ransomware?
Data Center Knowledge–The government is taking cybercrime more seriously than ever, but it should do a lot more than it has done so far, experts…
Report: Cloud Security Breaches Surpass On-Prem Ones for the First Time
DATA CENTER KNOWLEDGE–Verizon’s annual report on data breaches finds that more cybersecurity incidents involved external cloud assets than internal ones.
Pandemic, AWS Bombing Plot Heighten Data Center Physical Security Concerns
DATA CENTER KNOWLEDGE–The failed AWS plot highlights ongoing rise in physical threat activity accompanying the pandemic and social unrest.
Confidential Computing: Arm Builds Secure Enclaves for the Data Center
DATA CENTER KNOWLEDGE–Confidential computing in Armv9, called Arm CCA, builds on TrustZone secure enclave technology in mobile chips.
Security Tech Based on Each Chip’s Unique ‘Fingerprint’ Comes to Data Centers
DATA CENTER KNOWLEDGE–Minute inconsistencies introduced in manufacturing make every chip different from the rest and can be used for authentication.
Foiled AWS Data Center Bombing Plot Poses New Questions for Operators
DATA CENTER KNOWLEDGE–Targeting of data centers is a new development. Experts believe the incident should spur review of physical security posture, investment in dark-web monitoring.
Malware Wants to Phone Home. Trinity Cyber Doesn’t Try to Block It
DATA CENTER KNOWLEDGE–The startup, founded by former top US government cybersecurity officials, has a novel approach to neutralizing malicious communications.
HPE OneView: An Overview of the Popular IT Management Platform
The platform is designed to turn servers, storage, and networking equipment in your data center into software-defined infrastructure.
Emotet May Be Gone, But the Security Holes It Made Could Still Be Lingering in Data Centers
Its servers are offline, and this is a good time to check for any doors the notorious malware may have left open on your network.
An Adobe Flash Ghost May Be Haunting Your Data Center
Flash may be dead, but it lingers in more enterprise data centers than you may think, creating a massive vulnerability.