Latest Cybersecurity Articles

What is a managed service provider? Strategic outsourcing for IT services explained

Aug 12, 2021

CIO–MSPs are increasingly being turned to as strategic outsourcing partners that remotely manage or delivery IT services, thanks to talent and technologies most enterprises lack.

Ransomware recovery: 8 steps to successfully restore from backup

Aug 12, 2021

The best way to recover from a ransomware attack is to have a reliable and fast backup process. Here’s how to do it.

Why CISA’s China Cyberattack Playbook Is Worthy of Your Attention

Jul 27, 2021

The advisory outlines the tactics, techniques, and procedures China’s state-sponsored cybercriminals use to breach networks.

The Kaseya Ransomware Attack Is a Wakeup Call for MSP-Reliant IT Shops

Jul 13, 2021

DATA CENTER KNOWLEDGE–The pandemic has driven more outsourcing to MSPs, making them prime targets for cybercriminals wanting to scale their attacks.

Security Problems Worsen as Enterprises Build Hybrid and Multicloud Systems

Jul 8, 2021

DATA CENTER KNOWLEDGE–Under pressure to accelerate cloud adoption, IT orgs often skip over crucial security planning steps.

Botnet attacks on APIs: Why most companies are unprepared

Jun 29, 2021

CSO–The use of botnets to target applications for illegal and unethical purposes is growing, yet implementation of bot detection tools and best practices lags.

Pressure Grows for Federal Data Breach Legislation

Jun 22, 2021

DATA CENTER KNOWLEDGE–Even as cybersecurity grows in importance as a national priority, individual states continue to push ahead with their own data breach legislation, making…

Russian Cybercrime: Is Extradition Ahead?

Jun 15, 2021

DATA CENTER KNOWLEDGE–Russia has long been the world’s biggest haven for cybercrime. On Sunday, Russian President Vladimir Putin said that this would change. But will…

Is the US Government Doing Enough About Ransomware?

Jun 10, 2021

Data Center Knowledge–The government is taking cybercrime more seriously than ever, but it should do a lot more than it has done so far, experts…

How API attacks work, and how to identify and prevent them

May 21, 2021

CSO–Attackers know how to get around WAFs and API gateways when targeting APIs. Here’s how some companies are coping with the rapid increase in API…

Report: Cloud Security Breaches Surpass On-Prem Ones for the First Time

May 20, 2021

DATA CENTER KNOWLEDGE–Verizon’s annual report on data breaches finds that more cybersecurity incidents involved external cloud assets than internal ones.

Pandemic, AWS Bombing Plot Heighten Data Center Physical Security Concerns

May 12, 2021

DATA CENTER KNOWLEDGE–The failed AWS plot highlights ongoing rise in physical threat activity accompanying the pandemic and social unrest.

Confidential Computing: Arm Builds Secure Enclaves for the Data Center

May 5, 2021

DATA CENTER KNOWLEDGE–Confidential computing in Armv9, called Arm CCA, builds on TrustZone secure enclave technology in mobile chips.

Security Tech Based on Each Chip’s Unique ‘Fingerprint’ Comes to Data Centers

May 4, 2021

DATA CENTER KNOWLEDGE–Minute inconsistencies introduced in manufacturing make every chip different from the rest and can be used for authentication.

Tips and tactics of today’s cybersecurity threat hunters

May 3, 2021

CSO–Having internal threat hunting capability is becoming a necessity for many organizations. Here are the most common things they look for and how they respond…

Foiled AWS Data Center Bombing Plot Poses New Questions for Operators

Apr 27, 2021

DATA CENTER KNOWLEDGE–Targeting of data centers is a new development. Experts believe the incident should spur review of physical security posture, investment in dark-web monitoring.

Malware Wants to Phone Home. Trinity Cyber Doesn’t Try to Block It

Apr 19, 2021

DATA CENTER KNOWLEDGE–The startup, founded by former top US government cybersecurity officials, has a novel approach to neutralizing malicious communications.

HPE OneView: An Overview of the Popular IT Management Platform

Apr 7, 2021

The platform is designed to turn servers, storage, and networking equipment in your data center into software-defined infrastructure.

Emotet May Be Gone, But the Security Holes It Made Could Still Be Lingering in Data Centers

Mar 31, 2021

Its servers are offline, and this is a good time to check for any doors the notorious malware may have left open on your network.

An Adobe Flash Ghost May Be Haunting Your Data Center

Mar 23, 2021

Flash may be dead, but it lingers in more enterprise data centers than you may think, creating a massive vulnerability.

Microsoft Exchange Hack Could Be Worse Than SolarWinds

Mar 10, 2021

The massive hack’s scope keeps growing. Unlike the SolarWinds exploit, this one can be automated.

What Is Zscaler and How Does It Secure Enterprise Networks?

Mar 8, 2021

DATA CENTER KNOWLEDGE–The SASE company’s technology takes a zero-trust approach to protecting everything from your data center network to SaaS and users at home.

WAN challenges steer auto-rental firm to SASE

Mar 8, 2021

SASE helps global car-rental company Sixt strengthen its network security architecture and ride out COVID-19 challenges.

Critical VMware vSphere Vulnerability Is a Must-Patch

Feb 26, 2021

DATA CENTER KNOWLEDGE–“It’s really the highest possible risk we have, and exploitation is very simple.”

Managing Encryption for Data Centers Is Hard. And It Will Get Harder

Feb 16, 2021

DATA CENTER KNOWLEDGE–With multi-cloud already here and quantum computing on the horizon, most should probably leave encryption to the experts.

AI-Wielding Hackers are Here

Feb 10, 2021

DATA CENTER KNOWLEDGE–Intelligent cybercrime tools exit proof of concept.

5 ways attackers counter incident response, and how to stop them

Feb 9, 2021

CSO ONLINE–IR has become a chess match with attackers who can cleverly spoil responders’ efforts and keep a foothold in systems. Here’s how they do…

How strong, flexible data protection controls can help maintain regulatory compliance

Feb 9, 2021

CSO ONLINE–An effective approach to data protection controls embraces ethical standards and anticipates new requirements. Here’s how some CISOs and other experts tackle the issue.

Supply chain attacks show why you should be wary of third-party providers

Feb 4, 2021

CSO ONLINE–The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

Quantum Teleportation Makes Progress, But Toward What?

Feb 2, 2021

DATA CENTER KNOWLEDGE–What could scientists’ recent success in teleporting quantum states mean for data centers of the future?