Nine Best Practices for Zero Trust
Getting started with zero trust can seem like a daunting task – but the benefits are worth the cost.
Why DevOps pipelines are under attack and how to fight back
NotPetya proved the effectiveness of an attack on the software supply chain, and attackers are targeting it more now. Here’s advice to reduce risk to…
As Concerns About Ukraine Mount, Gov’ts Issue Ransomware Alert
Organizations of all sizes are recommended to “adopt a heightened posture when it comes to cybersecurity.”
By Looking at the Past, New Cyber Board Can Prepare Us for the Future
The Cyber Safety Review Board will see government agencies collaborate with security and network companies.
Latest Cisco VPN Router Vulnerabilities Pose Risks To Small Businesses – And Their Partners
With employees working from home during the pandemic, usage of this type of hardware has increased.
Denial of Service Attacks Expected To Get Bigger, Nastier
And we thought 2021 was bad enough.
Top Three Use Cases for AI in Cybersecurity
Artificial intelligence systems can help detect zero-day malware, prioritize threats, and take automated remediation actions.
Cato adds fine-grained CASB controls to SASE platform
Adding CASB functionality to Cato’s SASE Cloud architecture is meant to make it easier for enterprises to protect against data breaches and cloud-delivered threats.
Top 10 outages of 2021
Cisco-owned network intelligence company ThousandEyes reveals the 10 biggest outages of 2021.
Data residency laws pushing companies toward residency as a service
Many countries now require companies that operate within its boundaries to store data on their residents locally. Using residency-as-a-service providers is becoming an important option.
Log4Shell Vulnerability Highlights Software Supply Chain Issues
Open source is everywhere, and it is all vulnerable.
Looking Forward to 2022: What To Expect in Cybersecurity
Many of the same threats, delivered faster, and with more automation and efficiency.
Enterprises See Exponential Growth in log4jshell Attacks
Hackers rush to exploit the vulnerability to steal data, deploy ransomware, install back doors, create botnets, mine cryptocurrencies, and conduct other illegal activities.
Trust no one: New technology platforms expand the attack surface
The rapid deployment of 5G and edge computing, the transition to work-from-home, combined with accelerating growth of mobile apps, APIs and web services are expanding…
On-prem-as-a-service comes into its own during pandemic
With this approach, the hardware is owned by the service provider, so upfront capital expenses are replaced by operating expenses. Scaling up and down is…
SolarWinds Hackers Step Up Attacks Against IT Services Firms
The Russian state actors behind last year’s SolarWinds attack have been targeting IT resellers and service providers since at least May, according to a Microsoft…
Post-Pandemic, Data Centers Adapt to “New Normal”
Data center management has permanently changed as a result of the coronavirus pandemic. Read up on how data centers are evolving.
Cloud Identity Is “New Normal” Replacement for On-Prem Tools
With the rise of work-from-home, SaaS, IoT, cloud, mobile and edge computing, the traditional on-premises identity and authentication systems are becoming obsolete, giving way to…
API Attacks, Breaches Piling Up
APIs have emerged as a major attack vector, with only 6% of companies reporting no API-related security issues in the past year, according to one…
Five Functions That Benefit From Cybersecurity Automation
Businesses are facing staff shortages and budget constraints that impact their ability to maintain security. Cybersecurity automation, including AI-powered intelligent automation, is helping close the…
SASE Model Proving Value Beyond Remote Work Scenarios
When the pandemic hit, enterprises rushed to the new cloud-based networking solutions for remote employees. Now it’s being applied to on-prem data centers and WANs.
Paying Hackers’ Ransom Demands Is Getting Harder
The U.S. Treasury Department has sanctioned a cryptocurrency exchange for its role in facilitating ransomware payments and issued an advisory to private companies against making…
OMIGOD Vulnerability Exposes Virtual Machines Running Inside Azure
New Azure-based OMIGOD vulnerability is easy to exploit and has already been attacked by Mirai botnet.
What to expect from SASE certifications
NETWORK WORLD–Free and fee-based SASE certifications are cropping up from vendors including Cato Networks, Netskope and Versa Networks. Are they worth the effort?
Zero-Trust Model Gains Luster Following Azure Security Flaw
DATA CENTER KNOWLEDGE–Microsoft Azure vulnerability, ChaosDB, exposes the fact that enterprises can’t simply trust cloud providers to protect the infrastructure. Experts point to the zero-trust…
Microsoft Azure Vulnerability ‘Breaks Secure Multitenancy’
Researchers from cloud security firm Wiz reported an Azure vulnerability affecting Cosmos DB that gave them complete access to thousands of Azure customers.
Taking a Close Look at the $2B for Cybersecurity in the $1T US Infrastructure Bill
The $1 trillion spending package includes funds for bolstering cybersecurity posture in critical digital infrastructure.
What is a managed service provider? Strategic outsourcing for IT services explained
CIO–MSPs are increasingly being turned to as strategic outsourcing partners that remotely manage or delivery IT services, thanks to talent and technologies most enterprises lack.
Ransomware recovery: 8 steps to successfully restore from backup
The best way to recover from a ransomware attack is to have a reliable and fast backup process. Here’s how to do it.
Why CISA’s China Cyberattack Playbook Is Worthy of Your Attention
The advisory outlines the tactics, techniques, and procedures China’s state-sponsored cybercriminals use to breach networks.