How privacy is moving data security to the top of corporate agendas
It’s no longer privacy vs security. Regulations like GDPR and customer data breaches have joined privacy and security efforts at the hip.
Why securing containers and microservices is a challenge
Their granularity, deployment speed, and data traffic volume require new approaches to securing container environments.
Why Common Knowledge of Cyberattack Lifecycle is Wrong
Today’s cyberattack lifecycle is short, unpredictable, and often with brutal results.
Edge Computing May Increase Attack Surface
To protect the edge, enterprises should move toward architectures that will protect applications even if the infrastructure is compromised.
Data Center Infrastructure, the Often-Overlooked Security Risk
Power supplies, cooling systems, even security systems themselves can all be entry points for attackers.
Cybersecurity Drills More Important Than Ever for Data Centers
No amount of planning can replace regular drills. Here’s what they should include.
Verizon report: Ransomware top malware threat of 2017, moving into critical systems
DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.
Serverless Apps a New Frontier for Cybersecurity
Serverless applications increase the attack surface by introducing privilege escalation and application dependencies.
Equinix Pitches Single System for All Your Cloud Encryption Keys
Colo provider first to market among peers with encryption service based on Intel’s cutting-edge SGX tech.
How to detect and prevent crypto mining malware
Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great…
Open source software security challenges persist
Using open source components saves developers time and companies money. In other words, it’s here to stay. Here’s a look at what it will take…
With Much of the Data Center Stack Open Source, Security is a Special Challenge
Without a vendor behind it, open source software takes a deliberate effort by IT to secure it.
SEC’s new cybersecurity guidance falls short
Post Equifax, those who hoped that the US Securities and Exchange Commission would impose tougher rules (and consequences for breaking them) around reporting breaches will…
Hyper-Converged Infrastructure is a Mixed Bag for Cybersecurity
As is typical with new technologies, convenience and efficiency are the focus, while security takes the backseat.
The global cyber war is heating up: Why businesses should be worried
From NotPetya’s global disruption to North Korea’s digital plundering of financial institutions, state-sponsored cyber attacks should be top of mind for business leaders. Here’s how…
Cisco Beefs Up Hyper-Converged Security Engineering Muscle With Skyport Deal
Acquisition’s main purpose is brainpower; Skyport appliance will sunset
New cryptocurrencies offer better anonymity, new security challenges
Anonymous cryptocurrencies like Monero and Zcash help cybercriminals evade detection and make cryptojacking more profitable.
Cloud security configuration errors put data at risk; new tools can help
For companies that run entirely in the cloud, the entire business can be at risk. That has some looking for help with monitoring and verifying…
Spectre, Meltdown Hit On-Prem Windows Servers Hardest
Performance tax of patches in many cases unavoidable; chip vulnerabilities may accelerate shift to cloud
Critical Vulnerability Found in Dell EMC Storage, VMware Backup Products
An expert says accessing the Dell EMC appliance allows attackers to get at the information stored in critical databases and servers without having to break…
AI’s Biggest Impact in the Data Center is Cybersecurity
AI tools can handle more data than human security pros ever can and find anomalies that are invisible to humans.
Open source software security challenges persist, but the risk can be managed
Using open source components saves developers time and companies money. In other words, it’s here to stay. Here’s a look at what it will take…
Attackers Have a New Way to Damage Data Center Infrastructure
A new kind of malware goes after industrial safety systems that provide emergency shutdown capabilities. It can cause damage or shut down operations. The malware…
Password managers grow up, target business users
Password managers began as free or low-cost apps for consumers, tracking passwords and sign-ins to websites and applications, making it possible for users to create…
VMware-Carbon Black Partnership Expected to Close Data Center Security Gaps
Short on security professionals, enterprises scream for more automation as attacks increase in number and scope.
Despite Takedowns, Botnets Aren’t Going Away Any Time Soon
Here’s what data center managers can do to reduce exposure to the likes of the Andromeda botnet.
What is a botnet? And why they aren’t going away anytime soon
Controlling thousands or even millions of devices gives cyber attackers the upper hand to deliver malware or conduct a DDoS attack.
Why Traditional Security Info and Event Management Tools No Longer Cut It
By being slow to add deep visibility into cloud environments, incumbent SIEM vendors leave themselves open to disruption by the likes of Splunk.
How the Cloud Killed the Firewall
The firewall as we know it cannot keep up with today’s enterprise application needs.
Data Center Security: Honey Pots and the Art of Deceiving Hackers
While a lot of work, honey pots are one of the most effective ways of pre-empting serious security breaches.