The SolarWinds Breach Is Shaking Up Incident Response
DATA CENTER KNOWLEDGE–The attack exposed big weaknesses, creating an opportunity for enterprises to address them.
Intel Says Its SGX Secure Enclaves Shine in Bare Metal Deployments
DATA CENTER KNOWLEDGE–Bare metal is making a comeback, and Intel says its chip-based confidential computing fits better than VM-based alternatives.
What are Supply Chain Attacks, and How to Guard Against Them
DATA CENTER KNOWLEDGE–The three basic categories of supply chain attacks, why they’re especially devastating, and what can be done to guard against them.
10 Cybersecurity Threats Enterprise IT Should Watch Out for in 2021
DATA CENTER KNOWLEDGE–Ransomware, the pandemic, and government hackers made 2020 a banner year for cybercrime. Here’s what security experts say is in store for this…
The List of Known SolarWinds Breach Victims Grows, as Do Attack Vectors
DATA CENTER KNOWLEDGE–Concerns mount that SolarWinds may not have been the only IT vendor used to build backdoors into enterprise networks.
CPRA explained: New California privacy law ramps up restrictions on data use
CSO ONLINE–The California Privacy Rights Act more closely aligns with the EU’s General Data Protection Regulation. Mid-sized companies not yet GDPR compliant face the biggest…
What Data Center IT Security Pros Must Know About the SolarWinds Vulnerability
DATA CENTER KNOWLEDGE–The unprecedented attack, whose full scope is yet to be determined, gave those behind it access to some of the most sensitive enterprise…
The Pandemic Struck, and Cyber Criminals Went to Work
DATA CENTER KNOWLEDGE–This has been a record year for cybercrime, thanks to COVID-19, ransomware, and nation-state attacks.
Remote Data Center Management Tools Must Learn to Play Together
DATA CENTER KNOWLEDGE–The missing piece is preventing truly holistic, intelligent infrastructure management from emerging.
Remote Data Center Management Investments Pay Off in the Pandemic
DATA CENTER KNOWLEDGE–Those who hesitated to use the technology before now have a clear picture of its value.
How secure are your AI and machine learning projects?
CSO–Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here’s how several companies have minimized their risk.
Remote Data Center Management Tools are No Longer Optional
DATA CENTER KNOWLEDGE–The pandemic has made implementation of advanced tooling in data centers a priority.
Open Compute Project Releases Hardware Root of Trust Spec for Data Centers
DATA CENTER KNOWLEDGE–Launched to help hyperscalers, the spec is expected to help smaller data center operators achieve hyperscaler-level security, too.
How to Avoid Paying Ransomware Ransoms
DATA CENTER KNOWLEDGE–As private experts and government officials advise against indulging the bad guys, here are some tips for following that advice.
Is the VPN Dead? No, It’s Doing Quite Well, Actually
While outdated, it’s been the go-to technology for enterprises dealing with the switch to remote work.
How to protect backups from ransomware
CSO–Ransomware is getting smarter, attacking backups to prevent recovery. Prevent this from happening by taking a few simple steps.
Who’s selling SASE and what do you get?
NETWORK WORLD–Secure access services edge is a young, cloud-based architecture that shows promise, but the elements that make it up differ depending on who’s selling…
Supply chain attacks show why you should be wary of third-party providers
CSO–The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.
Cisco Router Vulnerability Puts Network Segmentation at Risk
The network vendor is urging customers to patch, as attackers actively exploit the CDPwn vulnerability.
Intel’s Ice Lake Chips to Enable Confidential Computing on Data Center-Grade Servers
The upcoming 3rd Gen Xeon Scalable processor will widely expand applicability of Intel SGX secure enclaves in data centers.
Another Gang Hides Ransomware Inside Virtual Machines
The Maze ransomware attack involved a full Windows 7 install and, like in the Ragnar Locker case, was hidden inside an Oracle VirtualBox.
How AI Is Used in Data Center Physical Security Today
While there is still a lot of baseless hype around AI, it is already making a real difference in some areas, including physical security.
Zerologon Vulnerability Spurs Rare DHS CISA Emergency Order
The Windows Active Directory vulnerability is severe, and blueprints for exploiting it are open source.
Netwalker, the Powerful New Strain of Ransomware Used Against Equinix
The colocation provider says it’s managed to mitigate successfully. Other victims weren’t so lucky.
Take Off Your Mask and Smile at the AI, Data Center Visitor
How AI-powered facial recognition tech helps data center security, and what benefits and challenges it brings in the midst of a pandemic.
What is SASE? A cloud service that marries SD-WAN with security
NETWORK WORLD–Secure access service edge is a Gartner model for streamlining network access, improving security, boosting network performance and reducing the number of vendors and…
IBM, Intel, AMD take different routes to hardware-based encryption
CSO–So-called confidential computing approaches allow data to remain encrypted while in use. That’s best done in hardware, and IBM, AMD and Intel are following different…
Why Some Data Centers Don’t Patch and Why They Should
Despite costly consequences, many data center operators don’t get around to patching serious security vulnerabilities until it’s too late.
Getting started with security automation
CSO–Stressed and stretched, IT security teams look to automation for relief from high volumes of alerts from their detection and response systems. Here’s how three…
Hackers Can Turn Off Your Dell Servers Remotely Using the Newly Found iDRAC Vulnerability
Researchers who found the path transversal vulnerability also found hundreds of exposed servers via the internet.