Enterprises turn to single-vendor SASE for ease of manageability
Getting the full SASE stack of networking and security capabilities from a single vendor can simplify deployment and management, but there are downsides to consider.
NTT, Palo Alto partner for managed SASE with AIOps
Using a managed services provider to deliver SASE can streamline deployment and free up enterprise resources.
Pros and cons of managed SASE
Managed SASE can be appealing for enterprises that want a single provider for deployment and management of WAN and security infrastructure, but there can be…
How AI chatbot ChatGPT changes the phishing game
The Microsoft-backed free chatbot is improving fast and can not only write emails, essays but can also code. ChatGPT is also polyglot and that could…
The cybersecurity challenges and opportunities of digital twins
The virtual representation of objects or systems through digital twins provide organizations greater insight into their assets but it can also invite malicious actors.
Cyberattacks Are Bypassing Multi-Factor Authentication
Cyber attackers are learning how to bypass MFA and data centers need to start looking at more advanced security measures. Until then, compensating controls need…
How to Secure Digital Twin Technology in Your Data Center
Digital twins are digital clones of physical systems that can make data centers easier to manage, but they also expand a data center’s attack surface…
IoT security strategy from those who use connected devices
Reducing threats from enterprise IoT devices requires monitoring tools, software vulnerability testing, and network security measures including network segmentation.
What is Quantum Computing and What Does It Have to Do with Encryption?
Data center cybersecurity managers need to start planning now for when quantum computing breaks current encryption standards.
Top 5 security risks of Open RAN
Open RAN enables interoperability among hardware, software, and interfaces used in cellular networks but also changes their attack surface.
AI in cybersecurity: Raising the stakes for enterprise defense
Enterprises, governments and other organizations now have access to more powerful weapons in their defensive arsenal with AI – but so do malevolent hackers.
6 signs your IAM strategy is failing, and how to fix it
Mistakes when implementing identity and access management systems, especially during upgrades, can have lasting effects. Here’s how to spot and avoid the worst of them.
Adversarial machine learning explained: How attackers disrupt AI and ML systems
Threat actors have several ways to fool or exploit artificial intelligence and machine learning systems and models, but you can defend against their tactics.
9 ways hackers will use machine learning to launch attacks
Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors…
Bugs in the data center: How social engineering impacts physical security
A closer look at how one penetration testing firm was able to breach the physical security of a data center in less than a week,…
7 machine identity management best practices
Managing machine identities can be just as important as managing human identities, especially in a zero-trust environment.
Fantastic Open Source Cybersecurity Tools and Where to Find Them
Open source software plays a key role in keeping data centers secure. Here are just a few projects making a difference.
Microchip Adds Real-Time Security to Its Root of Trust Silicon Tech
And it is not the only company to take hardware security seriously.
Machine Identity Management: A Fast-Growing Frontier of Security
Attackers are getting better at compromising machine identities, as billions of new devices and services are introduced to the network.
Legitimate Security Tool Used Against Ukrainian Power Grid, Now Top Global Threat
Impacket can be deployed for penetration testing – but it can also be used to execute malicious code.
What is the cyber kill chain? A model for tracing cyberattacks
The cyber kill chain describes the phases of a targeted cyberattack where defenders can identify and stop it.
6 Reasons Why More Automation Means More Secure Software
The growing complexity of software — and the ever-increasing security threats to the software supply chain — are often too much for mere human engineers…
Who’s selling SASE and what do you get?
SASE rolls networking and security into a cloud service, making it easier for enterprises to provide simple, secure access to corporate resources. Many vendors offer…
Physical Infrastructure Cybersecurity: A Growing Problem for Data Centers
Data centers remain vulnerable to attacks against operational technology – and broader adoption of IoT isn’t helping.
Cloudflare Expands Email Security and WAF, Announces API Security Service
This morning, Cloudflare announced a new API Gateway service to help companies manage their API security at a low cost.
AWS, Azure Vulnerabilities Would Have Allowed Access To Other Customers’ Accounts
AutoWarp is no longer a problem thanks to a centralized patching effort.
Network Encryption: A Double-edged Sword for Cybersecurity
How do you protect the recipient when you can’t see inside the message?
How attackers sidestep the cyber kill chain
Many of the most popular cyberattacks don’t follow all the steps of the cyber kill chain, but you have other methods to detect threats.
Gartner: SSE is SASE minus the SD-WAN
Security service edge (SSE) bundles a cloud access security broker, secure web gateway and ZTNA, according to Gartner.
Enterprises Need To Prepare for Broader Cyberwar
Russia has a long history of using cyberattacks against its enemies.