The Four Main Types of Cyberattack That Affect Data Center Uptime
Here are the most common types of attack that bring down data centers.
How First Citrus Bank got rid of employee passwords
The Florida bank rolled out passwordless authentication in February that relies on device biometrics of their smartphones.
Why It’s Time to Prepare for AI Wielding Hackers
In the AI-fueled security wars, most of the arsenal is currently in the hands of the good guys, but the balance of power might soon…
Investors Pour Money into Startups Killing the Data Center Firewall
Micro-segmentation company Guardicore raised $60 million this week, but it’s not alone.
Here’s How ZombieLoad Affects Data Centers and What to Do About It
Experts say exploits would be sophisticated and take a long time to build, but operators should act now.
SIEM Pricing Models Set for a Shake-Up
Next-gen SIEM providers eyeing incumbents with new tech features, modern takes on pricing
Verizon Releases Its Biggest Cyberthreat Trends Report Ever
Ransomware remains the dominant form of cyberattack and phishing attacks now have more impact, despite more awareness.
What is GPS spoofing? And how you can defend against it
The U.S. Global Positioning System, part of a network of global navigation satellite systems (GNSS), is vulnerable to attacks that could disrupt many industries. Here’s…
How Data Centers Can Use the New Smart Cybersecurity Tools
Attackers are smarter and attacks are more powerful, but so are the tools used to fight them.
The Ideal Data Center Access Control Device May Be in Your Pocket
You already use your phone to pay for groceries, so why not also use it to access your server room?
What Data Center Managers Can Learn from the Wipro Fishing Attack
India-based technology giant Wipro, which offers a “boundaryless data center” among its services, has fallen victim to a phishing attack that may have led to…
Google expands cloud security capabilities, including simpler configuration
New tools and services will help make it easier for enterprises to manage security with Google products as well as with Amazon and in their…
Google’s New Security Features Don’t Care Whose Data Center You’re In
The company extends its security capabilities beyond services running in its own cloud.
What is AI fuzzing? And why it may be the next big cybersecurity threat
Pairing artificial intelligence or machine learning with traditional fuzzing techniques creates a powerful tool to find application or system vulnerabilities — for both researchers and…
What We Can Learn from the Ransomware Attack That Crippled Norsk Hydro
Cryptojacking may be the hot new trend in large-scale cybercrime, but ransomware is still alive and well.
Edge Computing Is a New Frontier for Cybersecurity
Distributed, ubiquitous computing infrastructure can come at the price of a much bigger attack surface.
The Must-Haves for Your Data Center Cybersecurity Checklist
Explaining the NIST Cybersecurity Framework, the most popular of its kind.
What is quantum cryptography? It’s no silver bullet, but could improve security
In the arms race between white and black hats, the infosec industry looks to quantum cryptography and quantum key distribution (QKD). That may be just…
Can Google Become the Next Big Cybersecurity Vendor?
Backstory, a nascent Google cybersecurity unit’s first product, aims to protect enterprise infrastructure on-prem and in the cloud.
Bare-Metal Cloud Firmware Security Fail Isn’t Limited to IBM — by Far
“This is really a broader industry concern about the firmware layer being effectively ignored by almost everybody.”
Is Your Data Center Power System Protected from Cyberattacks?
The most critical infrastructure in the data center also happens to be the most overlooked one by cybersecurity teams.
Should There Be ‘Safe Harbor’ Against Data-Breach Lawsuits?
New law on the books in Ohio protects firms that have suffered cyberattacks from being sued if they follow best practices.
What is biometrics? And why collecting biometric data is risky
Biometrics has the potential to make authentication dramatically faster, easier and more secure than traditional passwords, but companies need to be careful about the biometric…
Here’s What Cybersecurity Experts Worry About This Year
Cybercrime is getting cheaper and easier, and more players are getting into the business, while enterprise attack surface is growing.
In the Shutdown, the US Government Is Flirting with Cybersecurity Disaster
Network security is an around-the-clock battle. Agency cybersecurity teams are left with skeleton staff, and many furloughed security experts may not come back.
A New Type of Network Is on the Rise to Combat the Quantum Threat to Encryption
“Quantum-proof” encryption algorithms won’t be entirely quantum-proof. Quantum key distribution networks could be the answer.
How security operations centers are adapting to the cloud era
Moving data and processes to the cloud presents challenges for enterprise SOCs. Here’s how the industry and business are finding new ways to collect, monitor…
Report of Gaping Security Holes at US Missile Defense Systems Data Centers Shocks Experts
Private-sector cybersecurity professionals say failure to follow basic security guidelines greatly weakens national security.
8 old technologies that still play roles in security
Newer isn’t always better, at least where cybersecurity is concerned. For some applications, these older technologies are still effective ways to protect data and systems.
Cryptojacking: The Hot New Type of Attack on Data Centers
Servers hijacked for cryptocurrency mining may lead to higher bills from your cloud provider or your power utility.