Latest Cybersecurity Articles

Enterprises turn to single-vendor SASE for ease of manageability

Feb 2, 2023

Getting the full SASE stack of networking and security capabilities from a single vendor can simplify deployment and management, but there are downsides to consider.

NTT, Palo Alto partner for managed SASE with AIOps

Feb 2, 2023

Using a managed services provider to deliver SASE can streamline deployment and free up enterprise resources.

Pros and cons of managed SASE

Jan 20, 2023

Managed SASE can be appealing for enterprises that want a single provider for deployment and management of WAN and security infrastructure, but there can be…

How AI chatbot ChatGPT changes the phishing game

Jan 17, 2023

The Microsoft-backed free chatbot is improving fast and can not only write emails, essays but can also code. ChatGPT is also polyglot and that could…

The cybersecurity challenges and opportunities of digital twins

Dec 6, 2022

The virtual representation of objects or systems through digital twins provide organizations greater insight into their assets but it can also invite malicious actors.

Cyberattacks Are Bypassing Multi-Factor Authentication

Oct 28, 2022

Cyber attackers are learning how to bypass MFA and data centers need to start looking at more advanced security measures. Until then, compensating controls need…

How to Secure Digital Twin Technology in Your Data Center

Oct 27, 2022

Digital twins are digital clones of physical systems that can make data centers easier to manage, but they also expand a data center’s attack surface…

IoT security strategy from those who use connected devices

Oct 21, 2022

Reducing threats from enterprise IoT devices requires monitoring tools, software vulnerability testing, and network security measures including network segmentation.

What is Quantum Computing and What Does It Have to Do with Encryption?

Oct 21, 2022

Data center cybersecurity managers need to start planning now for when quantum computing breaks current encryption standards.

Top 5 security risks of Open RAN

Aug 15, 2022

Open RAN enables interoperability among hardware, software, and interfaces used in cellular networks but also changes their attack surface.

AI in cybersecurity: Raising the stakes for enterprise defense

Aug 11, 2022

Enterprises, governments and other organizations now have access to more powerful weapons in their defensive arsenal with AI – but so do malevolent hackers.

6 signs your IAM strategy is failing, and how to fix it

Jul 5, 2022

Mistakes when implementing identity and access management systems, especially during upgrades, can have lasting effects. Here’s how to spot and avoid the worst of them.

Adversarial machine learning explained: How attackers disrupt AI and ML systems

Jun 28, 2022

Threat actors have several ways to fool or exploit artificial intelligence and machine learning systems and models, but you can defend against their tactics.

9 ways hackers will use machine learning to launch attacks

Jun 13, 2022

Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors…

Bugs in the data center: How social engineering impacts physical security

Jun 9, 2022

A closer look at how one penetration testing firm was able to breach the physical security of a data center in less than a week,…

7 machine identity management best practices

May 24, 2022

Managing machine identities can be just as important as managing human identities, especially in a zero-trust environment.

Fantastic Open Source Cybersecurity Tools and Where to Find Them

May 19, 2022

Open source software plays a key role in keeping data centers secure. Here are just a few projects making a difference.

Microchip Adds Real-Time Security to Its Root of Trust Silicon Tech

May 17, 2022

And it is not the only company to take hardware security seriously.

Machine Identity Management: A Fast-Growing Frontier of Security

May 5, 2022

Attackers are getting better at compromising machine identities, as billions of new devices and services are introduced to the network.

Legitimate Security Tool Used Against Ukrainian Power Grid, Now Top Global Threat

Apr 26, 2022

Impacket can be deployed for penetration testing – but it can also be used to execute malicious code.

What is the cyber kill chain? A model for tracing cyberattacks

Apr 14, 2022

The cyber kill chain describes the phases of a targeted cyberattack where defenders can identify and stop it.

6 Reasons Why More Automation Means More Secure Software

Apr 11, 2022

The growing complexity of software — and the ever-increasing security threats to the software supply chain — are often too much for mere human engineers…

Who’s selling SASE and what do you get?

Apr 7, 2022

SASE rolls networking and security into a cloud service, making it easier for enterprises to provide simple, secure access to corporate resources. Many vendors offer…

Physical Infrastructure Cybersecurity: A Growing Problem for Data Centers

Apr 6, 2022

Data centers remain vulnerable to attacks against operational technology – and broader adoption of IoT isn’t helping.

Cloudflare Expands Email Security and WAF, Announces API Security Service

Mar 16, 2022

This morning, Cloudflare announced a new API Gateway service to help companies manage their API security at a low cost.

AWS, Azure Vulnerabilities Would Have Allowed Access To Other Customers’ Accounts

Mar 11, 2022

AutoWarp is no longer a problem thanks to a centralized patching effort.

Network Encryption: A Double-edged Sword for Cybersecurity

Mar 8, 2022

How do you protect the recipient when you can’t see inside the message?

How attackers sidestep the cyber kill chain

Mar 7, 2022

Many of the most popular cyberattacks don’t follow all the steps of the cyber kill chain, but you have other methods to detect threats.

Gartner: SSE is SASE minus the SD-WAN

Mar 7, 2022

Security service edge (SSE) bundles a cloud access security broker, secure web gateway and ZTNA, according to Gartner.

Enterprises Need To Prepare for Broader Cyberwar

Mar 1, 2022

Russia has a long history of using cyberattacks against its enemies.