Latest Cybersecurity Articles

The Four Main Types of Cyberattack That Affect Data Center Uptime

The Four Main Types of Cyberattack That Affect Data Center Uptime

Jun 4, 2019

Here are the most common types of attack that bring down data centers.

How First Citrus Bank got rid of employee passwords

How First Citrus Bank got rid of employee passwords

Jun 4, 2019

The Florida bank rolled out passwordless authentication in February that relies on device biometrics of their smartphones.

Why It’s Time to Prepare for AI Wielding Hackers

Why It’s Time to Prepare for AI Wielding Hackers

Jun 3, 2019

In the AI-fueled security wars, most of the arsenal is currently in the hands of the good guys, but the balance of power might soon…

Investors Pour Money into Startups Killing the Data Center Firewall

Investors Pour Money into Startups Killing the Data Center Firewall

May 23, 2019

Micro-segmentation company Guardicore raised $60 million this week, but it’s not alone.

Here’s How ZombieLoad Affects Data Centers and What to Do About It

Here’s How ZombieLoad Affects Data Centers and What to Do About It

May 16, 2019

Experts say exploits would be sophisticated and take a long time to build, but operators should act now.

SIEM Pricing Models Set for a Shake-Up

SIEM Pricing Models Set for a Shake-Up

May 14, 2019

Next-gen SIEM providers eyeing incumbents with new tech features, modern takes on pricing

Verizon Releases Its Biggest Cyberthreat Trends Report Ever

Verizon Releases Its Biggest Cyberthreat Trends Report Ever

May 8, 2019

Ransomware remains the dominant form of cyberattack and phishing attacks now have more impact, despite more awareness.

What is GPS spoofing? And how you can defend against it

What is GPS spoofing? And how you can defend against it

May 7, 2019

The U.S. Global Positioning System, part of a network of global navigation satellite systems (GNSS), is vulnerable to attacks that could disrupt many industries. Here’s…

How Data Centers Can Use the New Smart Cybersecurity Tools

How Data Centers Can Use the New Smart Cybersecurity Tools

May 1, 2019

Attackers are smarter and attacks are more powerful, but so are the tools used to fight them.

The Ideal Data Center Access Control Device May Be in Your Pocket

The Ideal Data Center Access Control Device May Be in Your Pocket

Apr 23, 2019

You already use your phone to pay for groceries, so why not also use it to access your server room?

What Data Center Managers Can Learn from the Wipro Fishing Attack

What Data Center Managers Can Learn from the Wipro Fishing Attack

Apr 17, 2019

India-based technology giant Wipro, which offers a “boundaryless data center” among its services, has  fallen victim to a phishing attack  that may have led to…

Google expands cloud security capabilities, including simpler configuration

Google expands cloud security capabilities, including simpler configuration

Apr 10, 2019

New tools and services will help make it easier for enterprises to manage security with Google products as well as with Amazon and in their…

Google’s New Security Features Don’t Care Whose Data Center You’re In

Google’s New Security Features Don’t Care Whose Data Center You’re In

Apr 10, 2019

The company extends its security capabilities beyond services running in its own cloud.

What is AI fuzzing? And why it may be the next big cybersecurity threat

What is AI fuzzing? And why it may be the next big cybersecurity threat

Mar 26, 2019

Pairing artificial intelligence or machine learning with traditional fuzzing techniques creates a powerful tool to find application or system vulnerabilities — for both researchers and…

What We Can Learn from the Ransomware Attack That Crippled Norsk Hydro

What We Can Learn from the Ransomware Attack That Crippled Norsk Hydro

Mar 25, 2019

Cryptojacking may be the hot new trend in large-scale cybercrime, but ransomware is still alive and well.

Edge Computing Is a New Frontier for Cybersecurity

Edge Computing Is a New Frontier for Cybersecurity

Mar 20, 2019

Distributed, ubiquitous computing infrastructure can come at the price of a much bigger attack surface.

The Must-Haves for Your Data Center Cybersecurity Checklist

The Must-Haves for Your Data Center Cybersecurity Checklist

Mar 13, 2019

Explaining the NIST Cybersecurity Framework, the most popular of its kind.

What is quantum cryptography? It’s no silver bullet, but could improve security

What is quantum cryptography? It’s no silver bullet, but could improve security

Mar 12, 2019

In the arms race between white and black hats, the infosec industry looks to quantum cryptography and quantum key distribution (QKD). That may be just…

Can Google Become the Next Big Cybersecurity Vendor?

Can Google Become the Next Big Cybersecurity Vendor?

Mar 6, 2019

Backstory, a nascent Google cybersecurity unit’s first product, aims to protect enterprise infrastructure on-prem and in the cloud.

Bare-Metal Cloud Firmware Security Fail Isn’t Limited to IBM — by Far

Bare-Metal Cloud Firmware Security Fail Isn’t Limited to IBM — by Far

Mar 5, 2019

“This is really a broader industry concern about the firmware layer being effectively ignored by almost everybody.”

Is Your Data Center Power System Protected from Cyberattacks?

Is Your Data Center Power System Protected from Cyberattacks?

Feb 26, 2019

The most critical infrastructure in the data center also happens to be the most overlooked one by cybersecurity teams.

Should There Be ‘Safe Harbor’ Against Data-Breach Lawsuits?

Should There Be ‘Safe Harbor’ Against Data-Breach Lawsuits?

Feb 19, 2019

New law on the books in Ohio protects firms that have suffered cyberattacks from being sued if they follow best practices.

What is biometrics? And why collecting biometric data is risky

What is biometrics? And why collecting biometric data is risky

Feb 12, 2019

Biometrics has the potential to make authentication dramatically faster, easier and more secure than traditional passwords, but companies need to be careful about the biometric…

Here’s What Cybersecurity Experts Worry About This Year

Here’s What Cybersecurity Experts Worry About This Year

Feb 8, 2019

Cybercrime is getting cheaper and easier, and more players are getting into the business, while enterprise attack surface is growing.

In the Shutdown, the US Government Is Flirting with Cybersecurity Disaster

In the Shutdown, the US Government Is Flirting with Cybersecurity Disaster

Jan 14, 2019

Network security is an around-the-clock battle. Agency cybersecurity teams are left with skeleton staff, and many furloughed security experts may not come back.

A New Type of Network Is on the Rise to Combat the Quantum Threat to Encryption

A New Type of Network Is on the Rise to Combat the Quantum Threat to Encryption

Jan 10, 2019

“Quantum-proof” encryption algorithms won’t be entirely quantum-proof. Quantum key distribution networks could be the answer.

How security operations centers are adapting to the cloud era

How security operations centers are adapting to the cloud era

Jan 2, 2019

Moving data and processes to the cloud presents challenges for enterprise SOCs. Here’s how the industry and business are finding new ways to collect, monitor…

Report of Gaping Security Holes at US Missile Defense Systems Data Centers Shocks Experts

Report of Gaping Security Holes at US Missile Defense Systems Data Centers Shocks Experts

Dec 21, 2018

Private-sector cybersecurity professionals say failure to follow basic security guidelines greatly weakens national security.

8 old technologies that still play roles in security

8 old technologies that still play roles in security

Dec 10, 2018

Newer isn’t always better, at least where cybersecurity is concerned. For some applications, these older technologies are still effective ways to protect data and systems.

Cryptojacking: The Hot New Type of Attack on Data Centers

Cryptojacking: The Hot New Type of Attack on Data Centers

Dec 10, 2018

Servers hijacked for cryptocurrency mining may lead to higher bills from your cloud provider or your power utility.