Latest Cybersecurity Articles

Nine Best Practices for Zero Trust

Feb 25, 2022

Getting started with zero trust can seem like a daunting task – but the benefits are worth the cost.

Why DevOps pipelines are under attack and how to fight back

Feb 22, 2022

NotPetya proved the effectiveness of an attack on the software supply chain, and attackers are targeting it more now. Here’s advice to reduce risk to…

As Concerns About Ukraine Mount, Gov’ts Issue Ransomware Alert

Feb 16, 2022

Organizations of all sizes are recommended to “adopt a heightened posture when it comes to cybersecurity.”

By Looking at the Past, New Cyber Board Can Prepare Us for the Future

Feb 16, 2022

The Cyber Safety Review Board will see government agencies collaborate with security and network companies.

Latest Cisco VPN Router Vulnerabilities Pose Risks To Small Businesses – And Their Partners

Feb 9, 2022

With employees working from home during the pandemic, usage of this type of hardware has increased.

Top Three Use Cases for AI in Cybersecurity

Feb 3, 2022

Artificial intelligence systems can help detect zero-day malware, prioritize threats, and take automated remediation actions.

Cato adds fine-grained CASB controls to SASE platform

Feb 1, 2022

Adding CASB functionality to Cato’s SASE Cloud architecture is meant to make it easier for enterprises to protect against data breaches and cloud-delivered threats.

Top 10 outages of 2021

Jan 31, 2022

Cisco-owned network intelligence company ThousandEyes reveals the 10 biggest outages of 2021.

Data residency laws pushing companies toward residency as a service

Jan 26, 2022

Many countries now require companies that operate within its boundaries to store data on their residents locally. Using residency-as-a-service providers is becoming an important option.

Log4Shell Vulnerability Highlights Software Supply Chain Issues

Jan 11, 2022

Open source is everywhere, and it is all vulnerable.

Looking Forward to 2022: What To Expect in Cybersecurity

Dec 17, 2021

Many of the same threats, delivered faster, and with more automation and efficiency.

Enterprises See Exponential Growth in log4jshell Attacks

Dec 15, 2021

Hackers rush to exploit the vulnerability to steal data, deploy ransomware, install back doors, create botnets, mine cryptocurrencies, and conduct other illegal activities.

Trust no one: New technology platforms expand the attack surface

Nov 23, 2021

The rapid deployment of 5G and edge computing, the transition to work-from-home, combined with accelerating growth of mobile apps, APIs and web services are expanding…

On-prem-as-a-service comes into its own during pandemic

Nov 22, 2021

With this approach, the hardware is owned by the service provider, so upfront capital expenses are replaced by operating expenses. Scaling up and down is…

SolarWinds Hackers Step Up Attacks Against IT Services Firms

Nov 5, 2021

The Russian state actors behind last year’s SolarWinds attack have been targeting IT resellers and service providers since at least May, according to a Microsoft…

Post-Pandemic, Data Centers Adapt to “New Normal”

Oct 27, 2021

Data center management has permanently changed as a result of the coronavirus pandemic. Read up on how data centers are evolving.

Cloud Identity Is “New Normal” Replacement for On-Prem Tools

Oct 26, 2021

With the rise of work-from-home, SaaS, IoT, cloud, mobile and edge computing, the traditional on-premises identity and authentication systems are becoming obsolete, giving way to…

API Attacks, Breaches Piling Up

Oct 14, 2021

APIs have emerged as a major attack vector, with only 6% of companies reporting no API-related security issues in the past year, according to one…

Five Functions That Benefit From Cybersecurity Automation

Oct 6, 2021

Businesses are facing staff shortages and budget constraints that impact their ability to maintain security. Cybersecurity automation, including AI-powered intelligent automation, is helping close the…

SASE Model Proving Value Beyond Remote Work Scenarios

Sep 30, 2021

When the pandemic hit, enterprises rushed to the new cloud-based networking solutions for remote employees. Now it’s being applied to on-prem data centers and WANs.

Paying Hackers’ Ransom Demands Is Getting Harder

Sep 26, 2021

The U.S. Treasury Department has sanctioned a cryptocurrency exchange for its role in facilitating ransomware payments and issued an advisory to private companies against making…

OMIGOD Vulnerability Exposes Virtual Machines Running Inside Azure

Sep 22, 2021

New Azure-based OMIGOD vulnerability is easy to exploit and has already been attacked by Mirai botnet.

What to expect from SASE certifications

Sep 16, 2021

NETWORK WORLD–Free and fee-based SASE certifications are cropping up from vendors including Cato Networks, Netskope and Versa Networks. Are they worth the effort?

Zero-Trust Model Gains Luster Following Azure Security Flaw

Sep 3, 2021

DATA CENTER KNOWLEDGE–Microsoft Azure vulnerability, ChaosDB, exposes the fact that enterprises can’t simply trust cloud providers to protect the infrastructure. Experts point to the zero-trust…

Microsoft Azure Vulnerability ‘Breaks Secure Multitenancy’

Aug 31, 2021

Researchers from cloud security firm Wiz reported an Azure vulnerability affecting Cosmos DB that gave them complete access to thousands of Azure customers.

Taking a Close Look at the $2B for Cybersecurity in the $1T US Infrastructure Bill

Aug 27, 2021

The $1 trillion spending package includes funds for bolstering cybersecurity posture in critical digital infrastructure.

What is a managed service provider? Strategic outsourcing for IT services explained

Aug 12, 2021

CIO–MSPs are increasingly being turned to as strategic outsourcing partners that remotely manage or delivery IT services, thanks to talent and technologies most enterprises lack.

Ransomware recovery: 8 steps to successfully restore from backup

Aug 12, 2021

The best way to recover from a ransomware attack is to have a reliable and fast backup process. Here’s how to do it.

Why CISA’s China Cyberattack Playbook Is Worthy of Your Attention

Jul 27, 2021

The advisory outlines the tactics, techniques, and procedures China’s state-sponsored cybercriminals use to breach networks.