Latest articles for Data Center Knowledge

Five Functions That Benefit From Cybersecurity Automation

Five Functions That Benefit From Cybersecurity Automation

Data center cybersecurity managers have had it tough this pandemic. During the first half of 2021, bad actors launched 5.4 million DDoS attacks, setting a…

SASE Model Proving Value Beyond Remote Work Scenarios

SASE Model Proving Value Beyond Remote Work Scenarios

Gartner only coined the term SASE — secure access service edge — two years ago to describe a cloud-based service that combines SD-WAN networking with all the latest security…

Paying Hackers’ Ransom Demands Is Getting Harder

Paying Hackers’ Ransom Demands Is Getting Harder

If your data center’s ransomware recovery plan is to pay off the hackers with cryptocurrency, it’s time to rethink your strategy as regulators crack down.…

OMIGOD Vulnerability Exposes Virtual Machines Running Inside Azure

OMIGOD Vulnerability Exposes Virtual Machines Running Inside Azure

Late last month, researchers from cloud security firm Wiz found a new vulnerability that allows Azure users to access cloud databases of other users, breaking the principle…

Zero-Trust Model Gains Luster Following Azure Security Flaw

Zero-Trust Model Gains Luster Following Azure Security Flaw

Cloud use is at an all-time high, despite security worries. Last week’s ChaosDB vulnerability shows that enterprises need to adapt their security strategies and move to the…

Microsoft Azure Vulnerability ‘Breaks Secure Multitenancy’

Microsoft Azure Vulnerability ‘Breaks Secure Multitenancy’

Last week, researchers from cloud security firm Wiz reported a new vulnerability in Microsoft Azure’s managed database service, Cosmos DB, that they called the worst they’ve ever…

Taking a Close Look at the $2B for Cybersecurity in the $1T US Infrastructure Bill

Taking a Close Look at the $2B for Cybersecurity in the $1T US Infrastructure Bill

The 2,700-page $1 trillion infrastructure bill passed by the US Senate earlier this month still has the House of Representatives to get through. In addition to sizable…

Why CISA’s China Cyberattack Playbook Is Worthy of Your Attention

Why CISA’s China Cyberattack Playbook Is Worthy of Your Attention

At first glance, last week’s advisory on state-sponsored China cyberattacks by the FBI and the Cybersecurity and Infrastructure Security Agency is nothing new. It outlines the tactics,…

The Kaseya Ransomware Attack Is a Wakeup Call for MSP-Reliant IT Shops

The Kaseya Ransomware Attack Is a Wakeup Call for MSP-Reliant IT Shops

Managed service providers, the vendors companies hire to manage their IT infrastructure, have been having a second banner year in a row. The pandemic-driven switch…

Security Problems Worsen as Enterprises Build Hybrid and Multicloud Systems

Security Problems Worsen as Enterprises Build Hybrid and Multicloud Systems

Hybrid and multi-cloud architectures are all the rage in enterprise IT infrastructure. But enabling the flexibility to deploy the right tool for each task requires…

Pressure Grows for Federal Data Breach Legislation

Pressure Grows for Federal Data Breach Legislation

Cybersecurity is a major priority for U.S. President Joe Biden. It was at the top of the agenda at last week’s summit with Russian President…

Russian Cybercrime: Is Extradition Ahead?

Russian Cybercrime: Is Extradition Ahead?

The international community is putting increased pressure on Russia to stop protecting its cybercriminals. But while Russian President Vladimir Putin has made some positive statements,…

Is the US Government Doing Enough About Ransomware?

Is the US Government Doing Enough About Ransomware?

FBI’s seizure of $2.3 million worth of bitcoin Colonial Pipeline paid a ransomware gang to unlock its data was just the latest in a series…

Report: Cloud Security Breaches Surpass On-Prem Ones for the First Time

Report: Cloud Security Breaches Surpass On-Prem Ones for the First Time

Most cybersecurity incidents now involve cloud infrastructure, according to the latest Verizon Data Breach Investigations Report (DBIR). The annual report is the most researched of…

Pandemic, AWS Bombing Plot Heighten Data Center Physical Security Concerns

Pandemic, AWS Bombing Plot Heighten Data Center Physical Security Concerns

This relatively chaotic period has made data center operators increasingly worried about their facilities’ physical security. This had been true even before FBI announced the…

Confidential Computing: Arm Builds Secure Enclaves for the Data Center

Confidential Computing: Arm Builds Secure Enclaves for the Data Center

Arm chips for mobile and IoT devices have supported secure enclaves – a concept known as confidential computing – for years. It’s called the Arm…

Security Tech Based on Each Chip’s Unique ‘Fingerprint’ Comes to Data Centers

Security Tech Based on Each Chip’s Unique ‘Fingerprint’ Comes to Data Centers

The composable data center platform Fungible unveiled earlier this year has a number of new approaches to computing infrastructure. Its users can scale compute, storage,…

Foiled AWS Data Center Bombing Plot Poses New Questions for Operators

Foiled AWS Data Center Bombing Plot Poses New Questions for Operators

Following the recent arrest of a man who was allegedly plotting to blow up an AWS data center, operators of computing facilities – and other…

Malware Wants to Phone Home. Trinity Cyber Doesn’t Try to Block It

Malware Wants to Phone Home. Trinity Cyber Doesn’t Try to Block It

The SolarWinds breach, discovered last year, demonstrated how, with enough sophistication, malware can “phone home” for years, completely undetected. The hackers found ways around the…

HPE OneView: An Overview of the Popular IT Management Platform

HPE OneView: An Overview of the Popular IT Management Platform

Cloud infrastructure customers can get all their computing resources in one place – computing, storage, and networking. It’s one of the biggest ultimate benefits virtualization…

Emotet May Be Gone, But the Security Holes It Made Could Still Be Lingering in Data Centers

Emotet May Be Gone, But the Security Holes It Made Could Still Be Lingering in Data Centers

In January, an international group of law-enforcement agencies took down Emotet, the world’s top malware. Authorities took over its command-and-control servers and installed a kill…

An Adobe Flash Ghost May Be Haunting Your Data Center

An Adobe Flash Ghost May Be Haunting Your Data Center

Adobe’s Flash Player officially hit its end of life on January 1, 2021. It was a security risk while it was still alive. To data…

Microsoft Exchange Hack Could Be Worse Than SolarWinds

Microsoft Exchange Hack Could Be Worse Than SolarWinds

The scope of damage from the newly public Microsoft Exchange vulnerability keeps growing, with some experts saying that it is “worse than SolarWinds.” As of…

What Is Zscaler and How Does It Secure Enterprise Networks?

What Is Zscaler and How Does It Secure Enterprise Networks?

Zscaler saw unprecedented growth last year, replacing legacy networking platforms with its scalable cloud-based alternative at breakneck speed. Today, the company serves more than a…

Critical VMware vSphere Vulnerability Is a Must-Patch

Critical VMware vSphere Vulnerability Is a Must-Patch

VMware this week fixed two critical vulnerabilities in jts vCenter Server, used by data centers to manage the VMware vSphere server virtualization platform. VMware is…

Managing Encryption for Data Centers Is Hard. And It Will Get Harder

Managing Encryption for Data Centers Is Hard. And It Will Get Harder

Give up on trying to do it all yourself and leave it to the experts. Encryption is a core tenet for cybersecurity. Attackers can’t steal data…

AI-Wielding Hackers are Here

AI-Wielding Hackers are Here

In the summer of 2019, I wrote about the coming threat of AI-wielding hackers. I predicted that hackers would soon be using artificial intelligence to create new…

Quantum Teleportation Makes Progress, But Toward What?

Quantum Teleportation Makes Progress, But Toward What?

In what they described as a key milestone on the way to redefining global communications, a group of researchers recently managed to teleport quantum states…

The SolarWinds Breach Is Shaking Up Incident Response

The SolarWinds Breach Is Shaking Up Incident Response

The massive SolarWinds breach exposed some significant weaknesses in companies’ incident response practices. Responding to a cyberattack like SolarWinds, where a software update process in…

Intel Says Its SGX Secure Enclaves Shine in Bare Metal Deployments

Intel Says Its SGX Secure Enclaves Shine in Bare Metal Deployments

Last summer, Google announced that it was using AMD’s 2nd Gen Epyc chip to offer protected computing environments to its cloud customers. This approach, also known as…