Latest Cybersecurity Articles

What IP? Ex-con’s Security Firm Offers to Solve Hollywood’s Piracy Problem

What IP? Ex-con’s Security Firm Offers to Solve Hollywood’s Piracy Problem

Nov 17, 2017

Secure Channels pitches a secure storage service for movies and other sensitive intellectual property, but can it solve its reputation problem?

How hackers crack passwords and why you can’t stop them

How hackers crack passwords and why you can’t stop them

Nov 14, 2017

Password crackers have access to more stolen passwords and better password hacking software and tools than ever before.

New Chip Design Gains Traction as Fix for Major Data Center Security Hole

New Chip Design Gains Traction as Fix for Major Data Center Security Hole

Nov 8, 2017

Encrypting data at rest and in flight is not enough; solution could help Equifax avoid epic breach

What is the cyber kill chain? Why it’s not always the right approach to cyber attacks

What is the cyber kill chain? Why it’s not always the right approach to cyber attacks

Nov 7, 2017

As an infosec professional, you’ve likely heard about using a cyber kill chain, also known as a cyber attack lifecycle, to help identify and prevent…

AI Starts Making Inroads into Data Center Security

AI Starts Making Inroads into Data Center Security

Oct 31, 2017

Machine learning helps security systems uncover deviations human security pros cannot detect

The Huge Security Threat of Misconfigured Cloud and How to Fix It

The Huge Security Threat of Misconfigured Cloud and How to Fix It

Oct 26, 2017

As organizations move operations to cloud environments, basic security controls are sometimes not implemented correctly.

How AI can help you stay ahead of cybersecurity threats

How AI can help you stay ahead of cybersecurity threats

Oct 19, 2017

Since the 2013 Target breach, it’s been clear that companies need to respond better to security alerts even as volumes have gone up. With this…

Is It Time for Data Center Managers to Say Goodbye to Kaspersky?

Is It Time for Data Center Managers to Say Goodbye to Kaspersky?

Oct 18, 2017

Experts question the company’s ability to survive allegations that the Russian government has built backdoors into its software.

Unlimited DDoS protection the new norm after Cloudflare announcement

Unlimited DDoS protection the new norm after Cloudflare announcement

Oct 16, 2017

Late last month, global distributed denial of service (DDoS) protection provider Cloudflare announced that it would no longer charge customers extra when they were under…

How Worms Get inside Data Centers and What Can Be Done about Them

How Worms Get inside Data Centers and What Can Be Done about Them

Oct 12, 2017

WannaCry and Petya demonstrate that worms have come into their own, and keeping systems patched only goes so far from protecting your data center against…

Shadow cloud apps pose unseen risks

Shadow cloud apps pose unseen risks

Oct 10, 2017

It happens in every company. Employees find a cool new online service that makes them more productive. They create free or low-cost accounts on devices…

How to Fight the New Breed of DDoS Attacks on Data Centers

How to Fight the New Breed of DDoS Attacks on Data Centers

Oct 3, 2017

As attacks grow in scope and sophistication, infrastructure providers, telcos, and security vendors band together to fight back.

The best enterprise antivirus: Kaspersky leads in latest tests

The best enterprise antivirus: Kaspersky leads in latest tests

Oct 3, 2017

Ransomware and other threats often get through signature-based antivirus protection, giving it a bad rap. However, anti-virus tools still play an important role in the…

Why DDoS Attacks are on the Rise

Why DDoS Attacks are on the Rise

Sep 27, 2017

Attacks are growing in size, and “everyone has a target on their back.”

Cloudflare Stops Charging More for Bigger DDoS Attacks

Cloudflare Stops Charging More for Bigger DDoS Attacks

Sep 25, 2017

One year ago, security researcher and blogger Brian Krebs was hit by a massive DDoS attack, so big that his host booted him off their…

What is a fileless attack? How hackers invade systems without installing software

What is a fileless attack? How hackers invade systems without installing software

Sep 21, 2017

“We see it every day,” says Steven Lentz, CSO at Samsung Research America. “Something coming through, some exploit type, unknown ransomware. We’ve stopped several things…

China’s Quantum Net Advance Offers a Glimpse into the Future of Enterprise Security

China’s Quantum Net Advance Offers a Glimpse into the Future of Enterprise Security

Sep 20, 2017

Chinese companies actively productizing quantum key distribution, which pushes communications security to a new level Earlier this month, China’s official news agency Xinhua announced the…

Is universal end-to-end encrypted email possible (or even desirable)?

Is universal end-to-end encrypted email possible (or even desirable)?

Sep 18, 2017

People expect their email to be private between them and the recipient, but in reality, the contents of your email are exposed during transmission. Full…

Ransomware Grows Up, Goes After Data Centers

Ransomware Grows Up, Goes After Data Centers

Sep 12, 2017

Attacks on enterprise infrastructure reach unprecedented scale and ransomware payload Think your data center is safe from ransomware attacks because the attackers only go after…

VMware Builds Data Center Security into the Virtual Infrastructure

VMware Builds Data Center Security into the Virtual Infrastructure

Sep 6, 2017

Anti-malware defenses are struggling to keep up with constant floods of new, fast-evolving attacks but one thing that could help is if the infrastructure itself…

It’s Time to Replace Your Encryption-Key Spreadsheet

It’s Time to Replace Your Encryption-Key Spreadsheet

Aug 31, 2017

When a company stores critical data, whether in its own data center or in the cloud, encryption key management is vital to keeping that data…

What’s new in ransomware?

What’s new in ransomware?

Aug 29, 2017

In June, South Korean hosting company Internet Nayana, Inc., was  hit by a ransomware attack  that took down its 153 Linux web servers — home…

Are Encrypted Lockboxes for Data Centers Worth the Usability Cost?

Are Encrypted Lockboxes for Data Centers Worth the Usability Cost?

Aug 14, 2017

The idea is simple. First, you encrypt all your data and put the key somewhere safe. Then you send the data off to a data…

10 Things Data Center Operators Can Do to Prepare for GDPR

10 Things Data Center Operators Can Do to Prepare for GDPR

Aug 3, 2017

As we explained in an article earlier this week, the new European General Data Protection Regulation, which goes into effect next May, has  wide-reaching implications…

What Europe’s New Data Protection Law Means for Data Center Operators

What Europe’s New Data Protection Law Means for Data Center Operators

Aug 1, 2017

The new  European General Data Protection Regulation  goes into effect next May and applies to any company, anywhere in the world, that collects sensitive data…

Quantum Computing Could Make Today’s Encryption Obsolete

Quantum Computing Could Make Today’s Encryption Obsolete

Jul 19, 2017

Researchers at top university and corporate labs around the world are in a furious race to create the first practical, usable quantum computer. Quantum computers…

Look beyond job boards to fill cybersecurity jobs

Look beyond job boards to fill cybersecurity jobs

Jul 13, 2017

The cybersecurity talent shortage keeps getting worse. According to Cybersecurity Ventures, the cost of cybercrime will double from $3 trillion globally in 2015 to $6…

Is your data being sold on the dark web?

Is your data being sold on the dark web?

Jul 12, 2017

Sonatype’s crown jewel is its database of descriptions of over 1.2 million open source packages. “If that is lost, it could be an existential outcome,”…

Two years after the OPM data breach: What government agencies must do now

Two years after the OPM data breach: What government agencies must do now

Jun 20, 2017

The Office of Personnel Management breach in June 2015 was a big wake up call to our federal government, and, in its wake, a number…

With new dynamic capabilities, will whitelisting finally catch on?

With new dynamic capabilities, will whitelisting finally catch on?

Jun 19, 2017

Everybody knows and hates whitelisting. Employees are only allowed to install approved software on their desktops and laptops, so they’re always complaining and asking for…