Latest Cybersecurity Articles

How privacy is moving data security to the top of corporate agendas

How privacy is moving data security to the top of corporate agendas

May 16, 2018

It’s no longer privacy vs security. Regulations like GDPR and customer data breaches have joined privacy and security efforts at the hip.

Why securing containers and microservices is a challenge

Why securing containers and microservices is a challenge

May 3, 2018

Their granularity, deployment speed, and data traffic volume require new approaches to securing container environments.

Why Common Knowledge of Cyberattack Lifecycle is Wrong

Why Common Knowledge of Cyberattack Lifecycle is Wrong

May 1, 2018

Today’s cyberattack lifecycle is short, unpredictable, and often with brutal results.

Edge Computing May Increase Attack Surface

Edge Computing May Increase Attack Surface

Apr 19, 2018

To protect the edge, enterprises should move toward architectures that will protect applications even if the infrastructure is compromised.

Data Center Infrastructure, the Often-Overlooked Security Risk

Data Center Infrastructure, the Often-Overlooked Security Risk

Apr 17, 2018

Power supplies, cooling systems, even security systems themselves can all be entry points for attackers.

Cybersecurity Drills More Important Than Ever for Data Centers

Cybersecurity Drills More Important Than Ever for Data Centers

Apr 12, 2018

No amount of planning can replace regular drills. Here’s what they should include.

Verizon report: Ransomware top malware threat of 2017, moving into critical systems

Verizon report: Ransomware top malware threat of 2017, moving into critical systems

Apr 10, 2018

DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.

Serverless Apps a New Frontier for Cybersecurity

Serverless Apps a New Frontier for Cybersecurity

Apr 9, 2018

Serverless applications increase the attack surface by introducing privilege escalation and application dependencies.

Equinix Pitches Single System for All Your Cloud Encryption Keys

Equinix Pitches Single System for All Your Cloud Encryption Keys

Apr 6, 2018

Colo provider first to market among peers with encryption service based on Intel’s cutting-edge SGX tech.

How to detect and prevent crypto mining malware

How to detect and prevent crypto mining malware

Apr 4, 2018

Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great…

Open source software security challenges persist

Open source software security challenges persist

Apr 2, 2018

Using open source components saves developers time and companies money. In other words, it’s here to stay. Here’s a look at what it will take…

With Much of the Data Center Stack Open Source, Security is a Special Challenge

With Much of the Data Center Stack Open Source, Security is a Special Challenge

Mar 20, 2018

Without a vendor behind it, open source software takes a deliberate effort by IT to secure it.

SEC’s new cybersecurity guidance falls short

SEC’s new cybersecurity guidance falls short

Mar 5, 2018

Post Equifax, those who hoped that the US Securities and Exchange Commission would impose tougher rules (and consequences for breaking them) around reporting breaches will…

Hyper-Converged Infrastructure is a Mixed Bag for Cybersecurity

Hyper-Converged Infrastructure is a Mixed Bag for Cybersecurity

Feb 26, 2018

As is typical with new technologies, convenience and efficiency are the focus, while security takes the backseat.

The global cyber war is heating up: Why businesses should be worried

The global cyber war is heating up: Why businesses should be worried

Feb 22, 2018

From NotPetya’s global disruption to North Korea’s digital plundering of financial institutions, state-sponsored cyber attacks should be top of mind for business leaders. Here’s how…

Cisco Beefs Up Hyper-Converged Security Engineering Muscle With Skyport Deal

Cisco Beefs Up Hyper-Converged Security Engineering Muscle With Skyport Deal

Feb 1, 2018

Acquisition’s main purpose is brainpower; Skyport appliance will sunset

New cryptocurrencies offer better anonymity, new security challenges

New cryptocurrencies offer better anonymity, new security challenges

Feb 1, 2018

Anonymous cryptocurrencies like Monero and Zcash help cybercriminals evade detection and make cryptojacking more profitable.

Cloud security configuration errors put data at risk; new tools can help

Cloud security configuration errors put data at risk; new tools can help

Jan 29, 2018

For companies that run entirely in the cloud, the entire business can be at risk. That has some looking for help with monitoring and verifying…

Spectre, Meltdown Hit On-Prem Windows Servers Hardest

Spectre, Meltdown Hit On-Prem Windows Servers Hardest

Jan 23, 2018

Performance tax of patches in many cases unavoidable; chip vulnerabilities may accelerate shift to cloud

Critical Vulnerability Found in Dell EMC Storage, VMware Backup Products

Critical Vulnerability Found in Dell EMC Storage, VMware Backup Products

Jan 11, 2018

An expert says accessing the Dell EMC appliance allows attackers to get at the information stored in critical databases and servers without having to break…

AI’s Biggest Impact in the Data Center is Cybersecurity

AI’s Biggest Impact in the Data Center is Cybersecurity

Jan 11, 2018

AI tools can handle more data than human security pros ever can and find anomalies that are invisible to humans.

Open source software security challenges persist, but the risk can be managed

Open source software security challenges persist, but the risk can be managed

Jan 10, 2018

Using open source components saves developers time and companies money. In other words, it’s here to stay. Here’s a look at what it will take…

Attackers Have a New Way to Damage Data Center Infrastructure

Attackers Have a New Way to Damage Data Center Infrastructure

Jan 4, 2018

A new kind of malware goes after industrial safety systems that provide emergency shutdown capabilities. It can cause damage or shut down operations. The malware…

Password managers grow up, target business users

Password managers grow up, target business users

Jan 4, 2018

Password managers began as free or low-cost apps for consumers, tracking passwords and sign-ins to websites and applications, making it possible for users to create…

VMware-Carbon Black Partnership Expected to Close Data Center Security Gaps

VMware-Carbon Black Partnership Expected to Close Data Center Security Gaps

Dec 20, 2017

Short on security professionals, enterprises scream for more automation as attacks increase in number and scope.

Despite Takedowns, Botnets Aren’t Going Away Any Time Soon

Despite Takedowns, Botnets Aren’t Going Away Any Time Soon

Dec 8, 2017

Here’s what data center managers can do to reduce exposure to the likes of the Andromeda botnet.

What is a botnet? And why they aren’t going away anytime soon

What is a botnet? And why they aren’t going away anytime soon

Dec 6, 2017

Controlling thousands or even millions of devices gives cyber attackers the upper hand to deliver malware or conduct a DDoS attack.

Why Traditional Security Info and Event Management Tools No Longer Cut It

Why Traditional Security Info and Event Management Tools No Longer Cut It

Dec 5, 2017

By being slow to add deep visibility into cloud environments, incumbent SIEM vendors leave themselves open to disruption by the likes of Splunk.

How the Cloud Killed the Firewall

How the Cloud Killed the Firewall

Nov 29, 2017

The firewall as we know it cannot keep up with today’s enterprise application needs.

Data Center Security: Honey Pots and the Art of Deceiving Hackers

Data Center Security: Honey Pots and the Art of Deceiving Hackers

Nov 22, 2017

While a lot of work, honey pots are one of the most effective ways of pre-empting serious security breaches.