What is a managed service provider? Strategic outsourcing for IT services explained
CIO–MSPs are increasingly being turned to as strategic outsourcing partners that remotely manage or delivery IT services, thanks to talent and technologies most enterprises lack.
Ransomware recovery: 8 steps to successfully restore from backup
The best way to recover from a ransomware attack is to have a reliable and fast backup process. Here’s how to do it.
Why CISA’s China Cyberattack Playbook Is Worthy of Your Attention
The advisory outlines the tactics, techniques, and procedures China’s state-sponsored cybercriminals use to breach networks.
The Kaseya Ransomware Attack Is a Wakeup Call for MSP-Reliant IT Shops
DATA CENTER KNOWLEDGE–The pandemic has driven more outsourcing to MSPs, making them prime targets for cybercriminals wanting to scale their attacks.
Security Problems Worsen as Enterprises Build Hybrid and Multicloud Systems
DATA CENTER KNOWLEDGE–Under pressure to accelerate cloud adoption, IT orgs often skip over crucial security planning steps.
Botnet attacks on APIs: Why most companies are unprepared
CSO–The use of botnets to target applications for illegal and unethical purposes is growing, yet implementation of bot detection tools and best practices lags.
Pressure Grows for Federal Data Breach Legislation
DATA CENTER KNOWLEDGE–Even as cybersecurity grows in importance as a national priority, individual states continue to push ahead with their own data breach legislation, making…
Russian Cybercrime: Is Extradition Ahead?
DATA CENTER KNOWLEDGE–Russia has long been the world’s biggest haven for cybercrime. On Sunday, Russian President Vladimir Putin said that this would change. But will…
Is the US Government Doing Enough About Ransomware?
Data Center Knowledge–The government is taking cybercrime more seriously than ever, but it should do a lot more than it has done so far, experts…
How API attacks work, and how to identify and prevent them
CSO–Attackers know how to get around WAFs and API gateways when targeting APIs. Here’s how some companies are coping with the rapid increase in API…
Report: Cloud Security Breaches Surpass On-Prem Ones for the First Time
DATA CENTER KNOWLEDGE–Verizon’s annual report on data breaches finds that more cybersecurity incidents involved external cloud assets than internal ones.
Pandemic, AWS Bombing Plot Heighten Data Center Physical Security Concerns
DATA CENTER KNOWLEDGE–The failed AWS plot highlights ongoing rise in physical threat activity accompanying the pandemic and social unrest.
Confidential Computing: Arm Builds Secure Enclaves for the Data Center
DATA CENTER KNOWLEDGE–Confidential computing in Armv9, called Arm CCA, builds on TrustZone secure enclave technology in mobile chips.
Security Tech Based on Each Chip’s Unique ‘Fingerprint’ Comes to Data Centers
DATA CENTER KNOWLEDGE–Minute inconsistencies introduced in manufacturing make every chip different from the rest and can be used for authentication.
Tips and tactics of today’s cybersecurity threat hunters
CSO–Having internal threat hunting capability is becoming a necessity for many organizations. Here are the most common things they look for and how they respond…
Foiled AWS Data Center Bombing Plot Poses New Questions for Operators
DATA CENTER KNOWLEDGE–Targeting of data centers is a new development. Experts believe the incident should spur review of physical security posture, investment in dark-web monitoring.
Malware Wants to Phone Home. Trinity Cyber Doesn’t Try to Block It
DATA CENTER KNOWLEDGE–The startup, founded by former top US government cybersecurity officials, has a novel approach to neutralizing malicious communications.
HPE OneView: An Overview of the Popular IT Management Platform
The platform is designed to turn servers, storage, and networking equipment in your data center into software-defined infrastructure.
Emotet May Be Gone, But the Security Holes It Made Could Still Be Lingering in Data Centers
Its servers are offline, and this is a good time to check for any doors the notorious malware may have left open on your network.
An Adobe Flash Ghost May Be Haunting Your Data Center
Flash may be dead, but it lingers in more enterprise data centers than you may think, creating a massive vulnerability.
Microsoft Exchange Hack Could Be Worse Than SolarWinds
The massive hack’s scope keeps growing. Unlike the SolarWinds exploit, this one can be automated.
What Is Zscaler and How Does It Secure Enterprise Networks?
DATA CENTER KNOWLEDGE–The SASE company’s technology takes a zero-trust approach to protecting everything from your data center network to SaaS and users at home.
WAN challenges steer auto-rental firm to SASE
SASE helps global car-rental company Sixt strengthen its network security architecture and ride out COVID-19 challenges.
Critical VMware vSphere Vulnerability Is a Must-Patch
DATA CENTER KNOWLEDGE–“It’s really the highest possible risk we have, and exploitation is very simple.”
Managing Encryption for Data Centers Is Hard. And It Will Get Harder
DATA CENTER KNOWLEDGE–With multi-cloud already here and quantum computing on the horizon, most should probably leave encryption to the experts.
AI-Wielding Hackers are Here
DATA CENTER KNOWLEDGE–Intelligent cybercrime tools exit proof of concept.
5 ways attackers counter incident response, and how to stop them
CSO ONLINE–IR has become a chess match with attackers who can cleverly spoil responders’ efforts and keep a foothold in systems. Here’s how they do…
How strong, flexible data protection controls can help maintain regulatory compliance
CSO ONLINE–An effective approach to data protection controls embraces ethical standards and anticipates new requirements. Here’s how some CISOs and other experts tackle the issue.
Supply chain attacks show why you should be wary of third-party providers
CSO ONLINE–The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.
Quantum Teleportation Makes Progress, But Toward What?
DATA CENTER KNOWLEDGE–What could scientists’ recent success in teleporting quantum states mean for data centers of the future?