Data Center Knowledge–The government is taking cybercrime more seriously than ever, but it should do a lot more than it has done so far, experts say.
CSO–Attackers know how to get around WAFs and API gateways when targeting APIs. Here’s how some companies are coping with the rapid increase in API attacks.
DATA CENTER KNOWLEDGE—Verizon’s annual report on data breaches finds that more cybersecurity incidents involved external cloud assets than internal ones.
DATA CENTER KNOWLEDGE—The failed AWS plot highlights ongoing rise in physical threat activity accompanying the pandemic and social unrest.
DATA CENTER KNOWLEDGE—Confidential computing in Armv9, called Arm CCA, builds on TrustZone secure enclave technology in mobile chips.
DATA CENTER KNOWLEDGE—Minute inconsistencies introduced in manufacturing make every chip different from the rest and can be used for authentication.
CSO—Having internal threat hunting capability is becoming a necessity for many organizations. Here are the most common things they look for and how they respond to incidents.
DATA CENTER KNOWLEDGE—The startup, founded by former top US government cybersecurity officials, has a novel approach to neutralizing malicious communications.
The platform is designed to turn servers, storage, and networking equipment in your data center into software-defined infrastructure.
Its servers are offline, and this is a good time to check for any doors the notorious malware may have left open on your network.
Flash may be dead, but it lingers in more enterprise data centers than you may think, creating a massive vulnerability.
The massive hack’s scope keeps growing. Unlike the SolarWinds exploit, this one can be automated.
DATA CENTER KNOWLEDGE—The SASE company’s technology takes a zero-trust approach to protecting everything from your data center network to SaaS and users at home.
SASE helps global car-rental company Sixt strengthen its network security architecture and ride out COVID-19 challenges.
DATA CENTER KNOWLEDGE—”It’s really the highest possible risk we have, and exploitation is very simple.”