Latest articles for Data Center Knowledge

Cyberattacks Are Bypassing Multi-Factor Authentication

Cyberattacks Are Bypassing Multi-Factor Authentication

There has been a recent surge in cyber attacks which dodge past multi-factor authentication (MFA) security measures, putting data center systems at risk. The challenge…

How to Secure Digital Twin Technology in Your Data Center

How to Secure Digital Twin Technology in Your Data Center

A compelling use case in the data center industry for digital twins is the inspection and maintenance of high-risk electrical equipment. But a digital twin also multiplies any underlying security…

What is Quantum Computing and What Does It Have to Do with Encryption?

What is Quantum Computing and What Does It Have to Do with Encryption?

Data center cybersecurity managers have been getting warnings for years that quantum computing was on its way and it would break all existing encryption. With quantum…

Intel and Google Cloud Launch New Chip for Data Centers

Intel and Google Cloud Launch New Chip for Data Centers

Intel Corp and Alphabet Inc’s Google Cloud on Tuesday launched a co-designed chip that is meant to make data centers more secure and efficient. Google…

Equinix Doubles Digital Inclusion Philanthropy with New Foundation

Equinix Doubles Digital Inclusion Philanthropy with New Foundation

Even in tight economic times for most in the tech sector, some firms are restructuring and increasing their philanthropic efforts. Global colo provider Equinix has…

Colo providers looking to clean energy alternatives: hydrogen and nuclear

Colo providers looking to clean energy alternatives: hydrogen and nuclear

Climate change, regulatory initiatives and shareholder pressures are just some of the forces combining to drive colo providers to search for clean energy alternatives to…

Data Center Providers Continue Emerging Market Expansion, Despite Risks

Data Center Providers Continue Emerging Market Expansion, Despite Risks

Cloud solution providers (CSPs) and colocation data center companies are actively hunting for ripe emerging markets with large numbers of users and a shortage of…

Shift to Cloud Helps Data Centers Manage Unstructured Data

Shift to Cloud Helps Data Centers Manage Unstructured Data

Storing your unstructured data (such as data lakes, data warehouses, and large image/video archives) on the cloud could be the solution to giving users fast,…

iMasons Expands Into LATAM, Building Momentum for Climate Accord

iMasons Expands Into LATAM, Building Momentum for Climate Accord

The momentum around measuring the environmental impact of data centers is growing, making it easier for data center operators to understand each location’s carbon footprint.…

Arm Chips Gaining in Data Centers, But Still in Single Digits

Arm Chips Gaining in Data Centers, But Still in Single Digits

Arm technology may soon bring more energy efficiency to your data center servers. The firm’s chips are gaining popularity with hyperscalers and, and the technology…

Will Pelosi’s Taiwan Visit Affect Data Center Semiconductor Supply Chain?

Will Pelosi’s Taiwan Visit Affect Data Center Semiconductor Supply Chain?

Data center semiconductor chip supply chains have threatened server refresh cycles. House Speaker Nancy Pelosi traveled to Taiwan, and invoked the ire of China, one…

Bugs in the data center: How social engineering impacts physical security

Bugs in the data center: How social engineering impacts physical security

One data center management team learned the hard way that bugs can be a menace — or, to be more specific, the people who hunt…

Microchip Adds Real-Time Security to Its Root of Trust Silicon Tech

Microchip Adds Real-Time Security to Its Root of Trust Silicon Tech

Security is a multi-step process. There’s a chain of trust, with each link verified and authenticated by the one that comes before. But eventually, the…

Machine Identity Management: A Fast-Growing Frontier of Security

Machine Identity Management: A Fast-Growing Frontier of Security

The number of machines enterprise security teams have to manage is exploding. When it comes to computing infrastructure, servers have been supplanted by virtual machines,…

Legitimate Security Tool Used Against Ukrainian Power Grid, Now Top Global Threat

Legitimate Security Tool Used Against Ukrainian Power Grid, Now Top Global Threat

Earlier this year, security researchers reported the use of legitimate security tools in multiple attacks against Ukrainian organizations, including government agencies, non-profits, and tech companies.…

Physical Infrastructure Cybersecurity: A Growing Problem for Data Centers

Physical Infrastructure Cybersecurity: A Growing Problem for Data Centers

Modern data center infrastructure management (DCIM) platforms and other new tools put more power in the hands of facility managers. As a result, data centers…

Cloudflare Expands Email Security and WAF, Announces API Security Service

Cloudflare Expands Email Security and WAF, Announces API Security Service

Cloudflare is best known for its content delivery network and DDoS mitigation services, but it has been steadily expanding into other areas of web security…

AWS, Azure Vulnerabilities Would Have Allowed Access To Other Customers’ Accounts

AWS, Azure Vulnerabilities Would Have Allowed Access To Other Customers’ Accounts

Researchers from Orca Security have found two vulnerabilities in Amazon’s AWS and Microsoft’s Azure clouds that could have allowed users access to other customers’ infrastructure. Both Amazon…

Network Encryption: A Double-edged Sword for Cybersecurity

Network Encryption: A Double-edged Sword for Cybersecurity

In 2013, less than half of all web traffic was encrypted, according to Google. Today, the rate of network encryption stands at 95%. On the one hand, that’s…

Enterprises Need To Prepare for Broader Cyberwar

Enterprises Need To Prepare for Broader Cyberwar

As the fighting in Ukraine escalates and it looks like Russia won’t have the quick and easy victory it anticipated, the war is already having…

Nine Best Practices for Zero Trust

Nine Best Practices for Zero Trust

With the escalation of hostilities in Ukraine, increased activity by cybercriminal groups, and an ever-expanding attack surface caused by enterprises migrating to the cloud and…

As Concerns About Ukraine Mount, Gov’ts Issue Ransomware Alert

As Concerns About Ukraine Mount, Gov’ts Issue Ransomware Alert

The first international joint advisory about ransomware was issued last week as concerns mount about a potential Russian invasion of Ukraine. Tensions rose even higher on…

By Looking at the Past, New Cyber Board Can Prepare Us for the Future

By Looking at the Past, New Cyber Board Can Prepare Us for the Future

The Department of Homeland Security launched the country’s first Cyber Safety Review Board this month, a private-public initiative designed to improve cybersecurity. The CSRB will start…

Latest Cisco VPN Router Vulnerabilities Pose Risks To Small Businesses – And Their Partners

Latest Cisco VPN Router Vulnerabilities Pose Risks To Small Businesses – And Their Partners

Last week, Cisco disclosed 15 vulnerabilities in Cisco routers, including five with “critical” severity ratings. The vulnerabilities, which affect the Cisco Small Business RV160, RV260, RV340, and…

Denial of Service Attacks Expected To Get Bigger, Nastier

Denial of Service Attacks Expected To Get Bigger, Nastier

A distributed denial of service (DDoS) attack can take down a company’s infrastructure, communications, applications, or other services. It costs money to recover from such…

Top Three Use Cases for AI in Cybersecurity

Top Three Use Cases for AI in Cybersecurity

Cybersecurity professionals are facing an unprecedented threat environment, with record-high numbers of attacks, shortage of qualified staff, and increasing aggression and sophistication from nation-state actors.…

Space is the final frontier for data centers

Space is the final frontier for data centers

Last year marked the first time humanity deployed a conventional data center in space. The HPE Spaceborne Computer-2 – a set of HPE Edgeline Converged…

Log4Shell Vulnerability Highlights Software Supply Chain Issues

Log4Shell Vulnerability Highlights Software Supply Chain Issues

Open source software has eaten the world, but last month’s Log4Shell vulnerability chaos highlights the potential dangers when enterprises don’t treat it with the respect it deserves.…

Looking Forward to 2022: What To Expect in Cybersecurity

Looking Forward to 2022: What To Expect in Cybersecurity

Winston Churchill said, “Generals are always prepared to fight the last war.” He said this like it was a mistake. But in cybersecurity, we must…

Enterprises See Exponential Growth in log4jshell Attacks

Enterprises See Exponential Growth in log4jshell Attacks

  The Apache Log4j library is a Java-based logging tool that is ubiquitous in enterprise applications. The vulnerability known as Log4Shell, first reported on Dec.…