Google’s OpenTitan Chip Could Make Data Centers More Secure… Someday
Based on the secure chip in Pixel phones, the recently open sourced project holds promise for data center hardware.
What you need to know about the new OWASP API Security Top 10 list
APIs now account for 40% of the attack surface for all web-enabled apps. OWASP has identified 10 areas where enterprises can lower that risk.
Technical Debt: A Data Center Security Risk You Can’t Afford
Legacy applications can leave massive security holes and must be dealt with, no matter how critical they are.
How enterprises navigate GDPR data management rules
TECHTARGET–For businesses that operate in the European Union, complying with GDPR has to be a top priority. In many of these organizations, the burden is…
Survey: Most Data Center Managers Rely on Outdated Security Practices
While experts aren’t surprised, they recommend adding the latest tools to your security strategy now.
How Ethical Hacking Can Strengthen Your Data Center Security
White hat hackers can be extremely useful, as long as you stay within certain guardrails.
What Data Center Managers Can Do to Secure APIs, the New Perimeter
APIs make for a more feature-rich and dynamics world of applications, but they also increase attack surface.
Directory traversal explained: Definition, examples and prevention
Jira is just the most recent company to expose its customers via a path traversal vulnerability. This risk is easily avoidable, but developers keep making…
7 ways 5G mobile networks will change IoT security, and how to prepare
Every internet of things security issue will be greatly magnified in a 5G environment. Address these seven areas before you deploy your own.
Do Oracle Cloud’s “No-Oracle-Code” Servers Make It More Secure?
Taking a closer look at Larry Ellison’s claim of a superior, “fundamentally different” cloud architecture.
Business email compromise attacks cost millions, losses doubling each year
Cybercriminals follow the money, and you need look no further than Toyota Boshoku’s recent $37 million loss to see why many are turning to BEC…
Oracle’s Autonomous Cloud Security Claims Met with Skepticism
Is it really possible to eliminate data breaches by eliminating human operators, and would Oracle be the one to do it?
Rich PII enables sophisticated impersonation attacks
Hackers are now using rich personally identifying information, including device types and browser versions, cookies and web histories, and even voice recordings to gain account…
Micro-Segmentation Is Complicated, So Vonage Turned to Machine Learning for Help
Machine learning goes hand-in-hand with the new essential network security strategy.
Latest Data Center Network Security Strategies Revolve Around Intelligence
Intelligent tools are the only way to stay abreast of the current rate of change in the network.
How to Plug the Latest Supermicro Server Security Hole
The vulnerability gives attackers a way in through the internet, but that’s not the whole extent of the risk.
How AI Fuzzing Can Protect a Data Center or Be Its Worst Enemy
Manual penetration testing is quickly becoming obsolete, with AI-powered tools offering a way to cover the bases.
How secure are your AI and machine learning projects?
When enterprises adopt new technology, security is often on the back burner. It can seem more important to get new products or services to customers…
6 ways cybercriminals use commercial infrastructure
Whether through fraud or legitimate purchase, cybercriminals increasingly depend on mainstream services to support their activities.
Privacy and Security are Converging in the Data Center
New regulations like GDPR and CCPA can have a positive effect on security, but they can also get in the way of developing smart security…
The Evite Breach Demonstrates the Risk of Losing Track of Old Data
Old data may not be of much value to a business, but it can command top bitcoin on the dark web.
6 API security lessons from the Venmo breach
Cyber criminals are targeting application programming interfaces to steal sensitive data. Recent exposures and hacks at companies like Venmo, Facebook and Google present lessons to…
Why the WhatsApp Security Flaw Should Make Enterprise IT Nervous
The vulnerability is a reminder that apps on your employee’s phones represent a huge attack surface for your enterprise network.
The BlueKeep Vulnerability and Data Centers: What You Need to Know
Experts warn that BlueKeep attacks are on their way, and at least a million machines are vulnerable.
How to close SIEM visibility gaps created by legacy apps
It’s often difficult to make log files and other data from legacy applications accessible to security information and event management systems. Here are some options…
4 security concerns for low-code and no-code development
Low code does not mean low risk. By allowing more people in an enterprise to develop applications, low-code development creates new vulnerabilities and can hide…
Cloud Configurations Continue to Pose Data Center Security Challenges
Recent studies and surveys indicate that improperly configured public cloud instances continue to turn sensitive data into low hanging fruit.
Cloud’s Cybersecurity Challenges and Opportunities
As more data center managers move to private, public, and hybrid cloud infrastructures, new security challenges emerge, but clouds also offer new technologies to help…
6 ways malware can bypass endpoint protection
Breaches from attacks that defeat or run around endpoint protection measures are on the rise. Here’s how attackers do it.
The Four Main Types of Cyberattack That Affect Data Center Uptime
Here are the most common types of attack that bring down data centers.