Latest articles for Data Center Knowledge

Why Google Cloud Turned to AMD to Solve for Runtime Encryption

Why Google Cloud Turned to AMD to Solve for Runtime Encryption

As more and more companies look for end-to-end encryption in order to secure their data and operations and to meet compliance requirements, they work against…

Hackers Use Java to Hide Malware on the Data Center Network

Hackers Use Java to Hide Malware on the Data Center Network

Last week, the US Department of Homeland Security warned of attackers using remote desktop servers to attack data centers. “Due to the level of access…

VMware Cloud Director Vulnerability Allows Data Center Takeovers

VMware Cloud Director Vulnerability Allows Data Center Takeovers

A newly discovered vulnerability in VMware Cloud Director allows attackers who have compromised one account to spread to all the other accounts in a data…

New Malware Makes Air-Gapped Data Center Networks Less Bulletproof

New Malware Makes Air-Gapped Data Center Networks Less Bulletproof

“Air gapping,” or isolating certain systems by keeping them disconnected from the public internet, or any other networks, including your own, has for years been…

New Malware Hides Inside Rogue Virtual Machines

New Malware Hides Inside Rogue Virtual Machines

Malware developers have a new trick up their sleeve when it comes to evading detection — hiding their code inside a virtual machine. Researchers at…

Octarine Acquisition to Boost VMware’s Kubernetes Security Play

Octarine Acquisition to Boost VMware’s Kubernetes Security Play

VMware’s acquisition of the Kubernetes security startup Octarine reflects a shift in cybersecurity, driven by containerization of applications. “The focus is no longer about machines,…

Five Tips for Remote Data Center Manager Security During the Pandemic

Five Tips for Remote Data Center Manager Security During the Pandemic

As data center operators rushed to get all but the most essential employees working remotely, some security issues may have been overlooked. Now that most…

Hackers Exploiting SaltStack Vulnerability Hit Data Centers

Hackers Exploiting SaltStack Vulnerability Hit Data Centers

After infrastructure automation software vendor SaltStack released a patch for two critical vulnerabilities last Wednesday, hackers acted quickly to reverse engineer the exploit and attack…

Cybersecurity Startups Seek New Ways in a Perimeter-Less, Zero-Trust World

Cybersecurity Startups Seek New Ways in a Perimeter-Less, Zero-Trust World

The perimeter is dead. For those enterprises that by then hadn’t gotten the memo, the stampede to work-from-home caused by the coronavirus pandemic was a…

Data Center Providers Adjust to Doing Business Remotely

Data Center Providers Adjust to Doing Business Remotely

While data center operators in the US aren’t required to send people home — they’re  considered  critical services — they have been keeping onsite staff…

Colo Customers Lean on Remote Data Center Management Tools Amid the Pandemic

Colo Customers Lean on Remote Data Center Management Tools Amid the Pandemic

The COVID-19 pandemic is putting data center infrastructure around the world to the test, as more users rely on it for remote work. That includes…

The Promise of Intelligent Cybersecurity Is Starting to Come True, Slowly

The Promise of Intelligent Cybersecurity Is Starting to Come True, Slowly

For years cybersecurity vendors have announced new technologies that would transform the industry with artificial intelligence, cloud delivery, and automation. Everything would get better, cheaper,…

Data Center Operators Cut Onsite Staff and Visitors, Postpone Projects

Data Center Operators Cut Onsite Staff and Visitors, Postpone Projects

In response to the COVID-19 pandemic, data center operators around the world are reducing foot traffic to their facilities and postponing non-critical maintenance and construction…

Intel Security Gap Hard to Exploit Without Physical Data Center Access

Intel Security Gap Hard to Exploit Without Physical Data Center Access

Late last week security researchers at Positive Technologies said they found a flaw in Intel chips’ read-only memory. They described the flaw as “unfixable” and…

Are You Getting Bang for Your Cybersecurity Budget Buck?

Are You Getting Bang for Your Cybersecurity Budget Buck?

By all measures, the IT industry appears to be losing the war against cyber attacks, yet companies continue spending more and more on security products.…

Palo Alto Partnership May Boost Confidence in Google Cloud’s Chronicle

Palo Alto Partnership May Boost Confidence in Google Cloud’s Chronicle

Chronicle, the Google Cloud security unit that reportedly has  struggled  in recent months, has expanded its firepower. Last week at the RSA cybersecurity conference in…

You’ve Encrypted Your Data in the Cloud, but are Your Keys Safe?

You’ve Encrypted Your Data in the Cloud, but are Your Keys Safe?

If putting unencrypted data up in a public cloud is like leaving your house unlocked, keeping encrypted data and the encryption keys in the same…

CCPA and GDPR: The Data Center Pitfalls of the ‘Right to be Forgotten’

CCPA and GDPR: The Data Center Pitfalls of the ‘Right to be Forgotten’

The new set of privacy laws that went into effect in California on January 1 affects companies in and outside of the state — across…

Should Data Centers Have Common Physical Infrastructure Security Standards?

Should Data Centers Have Common Physical Infrastructure Security Standards?

Today, when high-profile cyberattacks are in the news on a regular basis, is it time the data center industry came together on a common set…

Say Goodbye to Windows Server 2008 — and Hello to Azure?

Say Goodbye to Windows Server 2008 — and Hello to Azure?

Windows Server 2008 and several other popular platforms are going to be  retired on January 14, and Microsoft is tempting users to move to its…

Google Details Its Zero-Trust Architecture. Can Enterprises Use It?

Google Details Its Zero-Trust Architecture. Can Enterprises Use It?

In 2014, Google unveiled BeyondCorp, its zero-trust approach to user access and authentication. This week, Google expanded the same philosophy to machines, workloads, and services.…

CyrusOne Confirms Ransomware Attack, Says Six Customers Affected

CyrusOne Confirms Ransomware Attack, Says Six Customers Affected

CyrusOne on Thursday confirmed a ransomware attack earlier this week to its managed services division and said the attack affected six customers served primarily from…

With Aporeto, Palo Alto Looks Away from the Firewall and Toward the Future

With Aporeto, Palo Alto Looks Away from the Firewall and Toward the Future

Palo Alto Networks, the cybersecurity company known primarily for its next-generation firewall technology, made another move last month toward the new “zero trust” approach to…

Google’s OpenTitan Chip Could Make Data Centers More Secure… Someday

Google’s OpenTitan Chip Could Make Data Centers More Secure… Someday

Google open sourced its secure computer chip last week. The new  OpenTitan  project promises to make computing cheaper and more secure. But it will be…

Technical Debt: A Data Center Security Risk You Can’t Afford

Technical Debt: A Data Center Security Risk You Can’t Afford

Legacy applications, old operating systems, and other past-expiration-date technologies pose big risks to data centers, and the risks grow bigger with each day that passes.…

Survey: Most Data Center Managers Rely on Outdated Security Practices

Survey: Most Data Center Managers Rely on Outdated Security Practices

Daily news reports of high-profile breaches and massive credential dumps underscore the problems with relying on passwords for security. Users either opt for simple easy-to-guess…

How Ethical Hacking Can Strengthen Your Data Center Security

How Ethical Hacking Can Strengthen Your Data Center Security

The word “hacker” carries a negative connotation to many people, but hacking — even with the intent of breaking through security — isn’t always malicious.…

Survey: Most Enterprises Still Blame End-User Incompetence for Security Lapses

Survey: Most Enterprises Still Blame End-User Incompetence for Security Lapses

Data center cybersecurity professionals face many threats on a daily basis–cybercriminals, nation-state attackers, hacktivists, even malicious insiders. But a company’s own employees are the biggest…

What Data Center Managers Can Do to Secure APIs, the New Perimeter

What Data Center Managers Can Do to Secure APIs, the New Perimeter

An API, or application programming interface, is a way for two computer programs to talk to one another. A website, for example, may use an…

Do Oracle Cloud’s “No-Oracle-Code” Servers Make It More Secure?

Do Oracle Cloud’s “No-Oracle-Code” Servers Make It More Secure?

At the company’s OpenWorld conference in September, Oracle co-founder and CTO Larry Ellison claimed that Oracle’s cloud servers were more secure than those of other…