Latest Cybersecurity Articles

Google’s OpenTitan Chip Could Make Data Centers More Secure… Someday

Nov 14, 2019

Based on the secure chip in Pixel phones, the recently open sourced project holds promise for data center hardware.

What you need to know about the new OWASP API Security Top 10 list

Nov 14, 2019

APIs now account for 40% of the attack surface for all web-enabled apps. OWASP has identified 10 areas where enterprises can lower that risk.

Technical Debt: A Data Center Security Risk You Can’t Afford

Nov 6, 2019

Legacy applications can leave massive security holes and must be dealt with, no matter how critical they are.

How enterprises navigate GDPR data management rules

Oct 29, 2019

TECHTARGET–For businesses that operate in the European Union, complying with GDPR has to be a top priority. In many of these organizations, the burden is…

Survey: Most Data Center Managers Rely on Outdated Security Practices

Oct 25, 2019

While experts aren’t surprised, they recommend adding the latest tools to your security strategy now.

How Ethical Hacking Can Strengthen Your Data Center Security

Oct 24, 2019

White hat hackers can be extremely useful, as long as you stay within certain guardrails.

What Data Center Managers Can Do to Secure APIs, the New Perimeter

Oct 8, 2019

APIs make for a more feature-rich and dynamics world of applications, but they also increase attack surface.

Directory traversal explained: Definition, examples and prevention

Oct 7, 2019

Jira is just the most recent company to expose its customers via a path traversal vulnerability. This risk is easily avoidable, but developers keep making…

7 ways 5G mobile networks will change IoT security, and how to prepare

Oct 7, 2019

Every internet of things security issue will be greatly magnified in a 5G environment. Address these seven areas before you deploy your own.

Do Oracle Cloud’s “No-Oracle-Code” Servers Make It More Secure?

Oct 1, 2019

Taking a closer look at Larry Ellison’s claim of a superior, “fundamentally different” cloud architecture.

Business email compromise attacks cost millions, losses doubling each year

Oct 1, 2019

Cybercriminals follow the money, and you need look no further than Toyota Boshoku’s recent $37 million loss to see why many are turning to BEC…

Oracle’s Autonomous Cloud Security Claims Met with Skepticism

Sep 25, 2019

Is it really possible to eliminate data breaches by eliminating human operators, and would Oracle be the one to do it?

Rich PII enables sophisticated impersonation attacks

Sep 24, 2019

Hackers are now using rich personally identifying information, including device types and browser versions, cookies and web histories, and even voice recordings to gain account…

Micro-Segmentation Is Complicated, So Vonage Turned to Machine Learning for Help

Sep 23, 2019

Machine learning goes hand-in-hand with the new essential network security strategy.

Latest Data Center Network Security Strategies Revolve Around Intelligence

Sep 10, 2019

Intelligent tools are the only way to stay abreast of the current rate of change in the network.

How to Plug the Latest Supermicro Server Security Hole

Sep 6, 2019

The vulnerability gives attackers a way in through the internet, but that’s not the whole extent of the risk.

How AI Fuzzing Can Protect a Data Center or Be Its Worst Enemy

Sep 4, 2019

Manual penetration testing is quickly becoming obsolete, with AI-powered tools offering a way to cover the bases.

How secure are your AI and machine learning projects?

Sep 2, 2019

When enterprises adopt new technology, security is often on the back burner. It can seem more important to get new products or services to customers…

6 ways cybercriminals use commercial infrastructure

Aug 26, 2019

Whether through fraud or legitimate purchase, cybercriminals increasingly depend on mainstream services to support their activities.

Privacy and Security are Converging in the Data Center

Aug 20, 2019

New regulations like GDPR and CCPA can have a positive effect on security, but they can also get in the way of developing smart security…

The Evite Breach Demonstrates the Risk of Losing Track of Old Data

Aug 8, 2019

Old data may not be of much value to a business, but it can command top bitcoin on the dark web.

6 API security lessons from the Venmo breach

Jul 30, 2019

Cyber criminals are targeting application programming interfaces to steal sensitive data. Recent exposures and hacks at companies like Venmo, Facebook and Google present lessons to…

Why the WhatsApp Security Flaw Should Make Enterprise IT Nervous

Jul 24, 2019

The vulnerability is a reminder that apps on your employee’s phones represent a huge attack surface for your enterprise network.

The BlueKeep Vulnerability and Data Centers: What You Need to Know

Jul 16, 2019

Experts warn that BlueKeep attacks are on their way, and at least a million machines are vulnerable.

How to close SIEM visibility gaps created by legacy apps

Jul 16, 2019

It’s often difficult to make log files and other data from legacy applications accessible to security information and event management systems. Here are some options…

4 security concerns for low-code and no-code development

Jun 24, 2019

Low code does not mean low risk. By allowing more people in an enterprise to develop applications, low-code development creates new vulnerabilities and can hide…

Cloud Configurations Continue to Pose Data Center Security Challenges

Jun 12, 2019

Recent studies and surveys indicate that improperly configured public cloud instances continue to turn sensitive data into low hanging fruit.

Cloud’s Cybersecurity Challenges and Opportunities

Jun 10, 2019

As more data center managers move to private, public, and hybrid cloud infrastructures, new security challenges emerge, but clouds also offer new technologies to help…

6 ways malware can bypass endpoint protection

Jun 10, 2019

Breaches from attacks that defeat or run around endpoint protection measures are on the rise. Here’s how attackers do it.

The Four Main Types of Cyberattack That Affect Data Center Uptime

Jun 4, 2019

Here are the most common types of attack that bring down data centers.