Cisco Beefs Up Hyper-Converged Security Engineering Muscle With Skyport Deal
Acquisition’s main purpose is brainpower; Skyport appliance will sunset
Cisco Beefs Up Hyper-Converged Security Engineering Muscle With Skyport Deal Read More »
Acquisition’s main purpose is brainpower; Skyport appliance will sunset
Cisco Beefs Up Hyper-Converged Security Engineering Muscle With Skyport Deal Read More »
Anonymous cryptocurrencies like Monero and Zcash help cybercriminals evade detection and make cryptojacking more profitable.
New cryptocurrencies offer better anonymity, new security challenges Read More »
For companies that run entirely in the cloud, the entire business can be at risk. That has some looking for help with monitoring and verifying cloud security configuration.
Cloud security configuration errors put data at risk; new tools can help Read More »
Performance tax of patches in many cases unavoidable; chip vulnerabilities may accelerate shift to cloud
Spectre, Meltdown Hit On-Prem Windows Servers Hardest Read More »
An expert says accessing the Dell EMC appliance allows attackers to get at the information stored in critical databases and servers without having to break into those servers directly. Dell EMC and VMware have issued patches, which should be applied immediately.
Critical Vulnerability Found in Dell EMC Storage, VMware Backup Products Read More »
AI tools can handle more data than human security pros ever can and find anomalies that are invisible to humans.
AI’s Biggest Impact in the Data Center is Cybersecurity Read More »
Using open source components saves developers time and companies money. In other words, it’s here to stay. Here’s a look at what it will take to improve open source security.
Open source software security challenges persist, but the risk can be managed Read More »
A new kind of malware goes after industrial safety systems that provide emergency shutdown capabilities. It can cause damage or shut down operations. The malware — which FireEye calls Triton and Dragos calls TRISIS — is similar to the Stuxnet malware used in Iran in 2010 and Industroyer deployed in Ukraine in 2016. A recent
Attackers Have a New Way to Damage Data Center Infrastructure Read More »
Password managers began as free or low-cost apps for consumers, tracking passwords and sign-ins to websites and applications, making it possible for users to create and manage long, hard-to-guess and unique passwords for all their accounts. Most work by encrypting the password lists with a single master password that only the user knows, so that
Password managers grow up, target business users Read More »
Short on security professionals, enterprises scream for more automation as attacks increase in number and scope.
VMware-Carbon Black Partnership Expected to Close Data Center Security Gaps Read More »
Here’s what data center managers can do to reduce exposure to the likes of the Andromeda botnet.
Despite Takedowns, Botnets Aren’t Going Away Any Time Soon Read More »
Controlling thousands or even millions of devices gives cyber attackers the upper hand to deliver malware or conduct a DDoS attack.
What is a botnet? And why they aren’t going away anytime soon Read More »
By being slow to add deep visibility into cloud environments, incumbent SIEM vendors leave themselves open to disruption by the likes of Splunk.
Why Traditional Security Info and Event Management Tools No Longer Cut It Read More »
The firewall as we know it cannot keep up with today’s enterprise application needs.
How the Cloud Killed the Firewall Read More »
While a lot of work, honey pots are one of the most effective ways of pre-empting serious security breaches.
Data Center Security: Honey Pots and the Art of Deceiving Hackers Read More »