A New Type of Network Is on the Rise to Combat the Quantum Threat to Encryption
“Quantum-proof” encryption algorithms won’t be entirely quantum-proof. Quantum key distribution networks could be the answer.
Report of Gaping Security Holes at US Missile Defense Systems Data Centers Shocks Experts
Private-sector cybersecurity professionals say failure to follow basic security guidelines greatly weakens national security.
Cryptojacking: The Hot New Type of Attack on Data Centers
Servers hijacked for cryptocurrency mining may lead to higher bills from your cloud provider or your power utility.
Can Blockchain Fix Cybersecurity?
The technology holds a lot of promise for security, but there’s still a long way to go before it sees serious enterprise adoption.
Lessons From This Year’s Data Center Outages: Focus On the Fundamentals
Most downtime incidents in the past year resulted from known causes and were preventable via robust design and processes.
Cybersecurity Tools for Data Center Networks are Getting Smarter With Machine Learning
New tools put more power in the hands of security professionals, whose responsibilities have grown exponentially.
Are You Spending Too Much (or Too Little) on Cybersecurity?
Pinpointing the right level of security spend is easy in theory but not in practice.
CASB, SSO, or PAM? Access Control for Data Center Admins
Researchers agree that most enterprise security breaches involve stolen or weak passwords. Here are the main technological approaches to addressing this problem.
How to Secure Your AWS Storage Buckets
Amazon is responsible for securing its cloud. Your security inside its cloud is on you.
Why Entrusting Security to a Startup May Be Worth the Risk
They may not have the scale or the reputation of big vendors, but security startups are often better positioned to meet your specific needs.
California’s New Privacy Act May Drive Tighter Controls in Data Centers
The law goes into effect in 2020, but now is a good time to start preparing.
Can Supercomputers Improve Cybersecurity? Not for a While
Supercomputers are evolving at a maddening pace, but no matter how powerful, they remain impractical for solving security challenges.
Machine Learning Is Becoming a Must in Data Center Network Security
The volume of data traveling on networks and sophistication of attack tools are outpacing human experts’ capabilities.
Five Barriers to Adoption of Liquid Cooling in Data Centers
The rise of machine learning is driving adoption of liquid cooling, but the switch from air to liquid isn’t simple.
Does Your Data Center Have Adequate Cyber Insurance?
As enterprises get increasingly interconnected, cyber insurance for data centers is becoming not only a priority, it’s becoming a best practice.
Following Equinix’s Lead, Interxion Gets Into Encryption Key Management
Interxion has launched an encryption key management service called Key Guardian.
The Challenges and Opportunities of Big Data in Cybersecurity
While big data is a challenge to defend, big data concepts are now applied extensively across the cybersecurity industry.
Biggest Web Security Vulnerabilities Haven’t Changed Much — And That’s Not a Good Thing
After 15 years, the OWASP Top 10 list remains largely the same
Why Common Knowledge of Cyberattack Lifecycle is Wrong
Today’s cyberattack lifecycle is short, unpredictable, and often with brutal results.
Edge Computing May Increase Attack Surface
To protect the edge, enterprises should move toward architectures that will protect applications even if the infrastructure is compromised.
Data Center Infrastructure, the Often-Overlooked Security Risk
Power supplies, cooling systems, even security systems themselves can all be entry points for attackers.
Cybersecurity Drills More Important Than Ever for Data Centers
No amount of planning can replace regular drills. Here’s what they should include.
Serverless Apps a New Frontier for Cybersecurity
Serverless applications increase the attack surface by introducing privilege escalation and application dependencies.
Equinix Pitches Single System for All Your Cloud Encryption Keys
Colo provider first to market among peers with encryption service based on Intel’s cutting-edge SGX tech.
With Much of the Data Center Stack Open Source, Security is a Special Challenge
Without a vendor behind it, open source software takes a deliberate effort by IT to secure it.
Hyper-Converged Infrastructure is a Mixed Bag for Cybersecurity
As is typical with new technologies, convenience and efficiency are the focus, while security takes the backseat.
It’s Cool, It’s Well Wired, and It’s Staying in the EU
Ireland, already a European data center hub, expects GDPR and Brexit to drive more data center growth.
Cisco Beefs Up Hyper-Converged Security Engineering Muscle With Skyport Deal
Acquisition’s main purpose is brainpower; Skyport appliance will sunset
Spectre, Meltdown Hit On-Prem Windows Servers Hardest
Performance tax of patches in many cases unavoidable; chip vulnerabilities may accelerate shift to cloud
Critical Vulnerability Found in Dell EMC Storage, VMware Backup Products
An expert says accessing the Dell EMC appliance allows attackers to get at the information stored in critical databases and servers without having to break…