What IP? Ex-con’s Security Firm Offers to Solve Hollywood’s Piracy Problem
Secure Channels pitches a secure storage service for movies and other sensitive intellectual property, but can it solve its reputation problem?
How hackers crack passwords and why you can’t stop them
Password crackers have access to more stolen passwords and better password hacking software and tools than ever before.
New Chip Design Gains Traction as Fix for Major Data Center Security Hole
Encrypting data at rest and in flight is not enough; solution could help Equifax avoid epic breach
What is the cyber kill chain? Why it’s not always the right approach to cyber attacks
As an infosec professional, you’ve likely heard about using a cyber kill chain, also known as a cyber attack lifecycle, to help identify and prevent…
AI Starts Making Inroads into Data Center Security
Machine learning helps security systems uncover deviations human security pros cannot detect
The Huge Security Threat of Misconfigured Cloud and How to Fix It
As organizations move operations to cloud environments, basic security controls are sometimes not implemented correctly.
How AI can help you stay ahead of cybersecurity threats
Since the 2013 Target breach, it’s been clear that companies need to respond better to security alerts even as volumes have gone up. With this…
Is It Time for Data Center Managers to Say Goodbye to Kaspersky?
Experts question the company’s ability to survive allegations that the Russian government has built backdoors into its software.
Unlimited DDoS protection the new norm after Cloudflare announcement
Late last month, global distributed denial of service (DDoS) protection provider Cloudflare announced that it would no longer charge customers extra when they were under…
How Worms Get inside Data Centers and What Can Be Done about Them
WannaCry and Petya demonstrate that worms have come into their own, and keeping systems patched only goes so far from protecting your data center against…
Shadow cloud apps pose unseen risks
It happens in every company. Employees find a cool new online service that makes them more productive. They create free or low-cost accounts on devices…
How to Fight the New Breed of DDoS Attacks on Data Centers
As attacks grow in scope and sophistication, infrastructure providers, telcos, and security vendors band together to fight back.
The best enterprise antivirus: Kaspersky leads in latest tests
Ransomware and other threats often get through signature-based antivirus protection, giving it a bad rap. However, anti-virus tools still play an important role in the…
Why DDoS Attacks are on the Rise
Attacks are growing in size, and “everyone has a target on their back.”
Cloudflare Stops Charging More for Bigger DDoS Attacks
One year ago, security researcher and blogger Brian Krebs was hit by a massive DDoS attack, so big that his host booted him off their…
China’s Quantum Net Advance Offers a Glimpse into the Future of Enterprise Security
Chinese companies actively productizing quantum key distribution, which pushes communications security to a new level Earlier this month, China’s official news agency Xinhua announced the…
Is universal end-to-end encrypted email possible (or even desirable)?
People expect their email to be private between them and the recipient, but in reality, the contents of your email are exposed during transmission. Full…
Ransomware Grows Up, Goes After Data Centers
Attacks on enterprise infrastructure reach unprecedented scale and ransomware payload Think your data center is safe from ransomware attacks because the attackers only go after…
VMware Builds Data Center Security into the Virtual Infrastructure
Anti-malware defenses are struggling to keep up with constant floods of new, fast-evolving attacks but one thing that could help is if the infrastructure itself…
It’s Time to Replace Your Encryption-Key Spreadsheet
When a company stores critical data, whether in its own data center or in the cloud, encryption key management is vital to keeping that data…
What’s new in ransomware?
In June, South Korean hosting company Internet Nayana, Inc., was hit by a ransomware attack that took down its 153 Linux web servers — home…
Are Encrypted Lockboxes for Data Centers Worth the Usability Cost?
The idea is simple. First, you encrypt all your data and put the key somewhere safe. Then you send the data off to a data…
10 Things Data Center Operators Can Do to Prepare for GDPR
As we explained in an article earlier this week, the new European General Data Protection Regulation, which goes into effect next May, has wide-reaching implications…
What Europe’s New Data Protection Law Means for Data Center Operators
The new European General Data Protection Regulation goes into effect next May and applies to any company, anywhere in the world, that collects sensitive data…
Quantum Computing Could Make Today’s Encryption Obsolete
Researchers at top university and corporate labs around the world are in a furious race to create the first practical, usable quantum computer. Quantum computers…
Look beyond job boards to fill cybersecurity jobs
The cybersecurity talent shortage keeps getting worse. According to Cybersecurity Ventures, the cost of cybercrime will double from $3 trillion globally in 2015 to $6…
Is your data being sold on the dark web?
Sonatype’s crown jewel is its database of descriptions of over 1.2 million open source packages. “If that is lost, it could be an existential outcome,”…
Two years after the OPM data breach: What government agencies must do now
The Office of Personnel Management breach in June 2015 was a big wake up call to our federal government, and, in its wake, a number…
With new dynamic capabilities, will whitelisting finally catch on?
Everybody knows and hates whitelisting. Employees are only allowed to install approved software on their desktops and laptops, so they’re always complaining and asking for…