Latest Cybersecurity Articles

5G network slices could be vulnerable to attack, researchers say

5G network slices could be vulnerable to attack, researchers say

May 22, 2023

5G promises increased speed, lower latency, and support for a significantly larger number of connected devices. But the growth in devices and in new applications…

Insured companies more likely to be ransomware victims, sometimes more than once

Insured companies more likely to be ransomware victims, sometimes more than once

May 15, 2023

Companies with cyber insurance are more likely to get hit by ransomware, more likely to be attacked multiple times, and more likely to pay ransoms,…

Siemens focuses on zero trust, legacy hardware, supply chain challenges to ensure cybersecurity of internal systems

Siemens focuses on zero trust, legacy hardware, supply chain challenges to ensure cybersecurity of internal systems

Apr 25, 2023

Siemens has been working to be on top of vulnerabilities found in its products, but more importantly, to ensure the security of its internal operations.…

Secure Cloud Environments on a Budget: Focus on the Essentials

Secure Cloud Environments on a Budget: Focus on the Essentials

Apr 5, 2023

As tech companies continue to lay off employees and cut budgets, data center managers will have to figure out how to get the most bang…

AI-fueled search gives more power to the bad guys

AI-fueled search gives more power to the bad guys

Mar 29, 2023

Concerns about the reach of ChatGPT and how easier it may get for bad actors to find sensitive information have increased following Microsoft’s announcement of…

How ChatGPT Can Help and Hinder Data Center Cybersecurity

How ChatGPT Can Help and Hinder Data Center Cybersecurity

Mar 20, 2023

The world changed on Nov. 30, when OpenAI released ChatGPT to an unsuspecting public. Universities scrambled to figure out how to give take-home essays if…

Enterprises turn to single-vendor SASE for ease of manageability

Enterprises turn to single-vendor SASE for ease of manageability

Feb 2, 2023

Before the start of the Covid epidemic, a traditional WAN architecture with centralized security worked well for Village Roadshow. “Advanced security inspection services can be…

NTT, Palo Alto partner for managed SASE with AIOps

NTT, Palo Alto partner for managed SASE with AIOps

Feb 2, 2023

A new offering from IT services provider NTT combines Palo Alto Networks’ Prisma SASE offering with NTT’s managed network services and AIOps infrastructure. SASE – secure…

Pros and cons of managed SASE

Pros and cons of managed SASE

Jan 20, 2023

AmerCareRoyal, which provides disposable products for the food service and hospitality industries, is the product of six mergers and acquisitions over the past several years,…

How AI chatbot ChatGPT changes the phishing game

How AI chatbot ChatGPT changes the phishing game

Jan 17, 2023

ChatGPT, OpenAI’s free chatbot based on GPT-3.5, was released on 30 November 2022 and racked up a million users in five days. It is capable of…

The cybersecurity challenges and opportunities of digital twins

The cybersecurity challenges and opportunities of digital twins

Dec 6, 2022

Digital twins are a digital representation of objects, structures or systems that give organizations greater insight into the life cycle of these objects, but this…

Cyberattacks Are Bypassing Multi-Factor Authentication

Cyberattacks Are Bypassing Multi-Factor Authentication

Oct 28, 2022

There has been a recent surge in cyber attacks which dodge past multi-factor authentication (MFA) security measures, putting data center systems at risk. The challenge…

How to Secure Digital Twin Technology in Your Data Center

How to Secure Digital Twin Technology in Your Data Center

Oct 27, 2022

A compelling use case in the data center industry for digital twins is the inspection and maintenance of high-risk electrical equipment. But a digital twin also multiplies any underlying security…

IoT security strategy from those who use connected devices

IoT security strategy from those who use connected devices

Oct 21, 2022

Freeman Health System has around 8,000 connected medical devices in its 30 facilities in Missouri, Oklahoma, and Kansas. Many of these devices have the potential…

What is Quantum Computing and What Does It Have to Do with Encryption?

What is Quantum Computing and What Does It Have to Do with Encryption?

Oct 21, 2022

Data center cybersecurity managers have been getting warnings for years that quantum computing was on its way and it would break all existing encryption. With quantum…

Top 5 security risks of Open RAN

Top 5 security risks of Open RAN

Aug 15, 2022

When a cell phone or other mobile device connects to the nearest cell tower, the communication takes place over something called a RAN — a…

AI in cybersecurity: Raising the stakes for enterprise defense

AI in cybersecurity: Raising the stakes for enterprise defense

Aug 11, 2022

Artificial intelligence is supercharging the cyberwarfare between attackers and victims. Enterprises, governments and other organizations now have access to more powerful weapons in their defensive…

6 signs your IAM strategy is failing, and how to fix it

6 signs your IAM strategy is failing, and how to fix it

Jul 5, 2022

Companies have been developing and executing identity and access management (IAM) strategies for decades. “It started with mainframe time sharing, so nothing is new,” says Jay Bretzmann,…

Adversarial machine learning explained: How attackers disrupt AI and ML systems

Adversarial machine learning explained: How attackers disrupt AI and ML systems

Jun 28, 2022

As more companies roll out artificial intelligence (AI) and machine learning (ML) projects, securing them becomes more important. A report released by IBM and Morning Consult in…

9 ways hackers will use machine learning to launch attacks

9 ways hackers will use machine learning to launch attacks

Jun 13, 2022

Machine learning and artificial intelligence (AI) are becoming a core technology for some threat detection and response tools. The ability to learn on the fly…

Bugs in the data center: How social engineering impacts physical security

Bugs in the data center: How social engineering impacts physical security

Jun 9, 2022

One data center management team learned the hard way that bugs can be a menace — or, to be more specific, the people who hunt…

7 machine identity management best practices

7 machine identity management best practices

May 24, 2022

Machine identities are a large, and fast-growing part of the enterprise attack surface. The number of machines—servers, devices, and services—is growing rapidly and efforts to…

Fantastic Open Source Cybersecurity Tools and Where to Find Them

Fantastic Open Source Cybersecurity Tools and Where to Find Them

May 19, 2022

Open source is a double-edged sword for information security. On the one hand, security professionals rely on countless open source security software tools, frameworks, and…

Microchip Adds Real-Time Security to Its Root of Trust Silicon Tech

Microchip Adds Real-Time Security to Its Root of Trust Silicon Tech

May 17, 2022

Security is a multi-step process. There’s a chain of trust, with each link verified and authenticated by the one that comes before. But eventually, the…

Machine Identity Management: A Fast-Growing Frontier of Security

Machine Identity Management: A Fast-Growing Frontier of Security

May 5, 2022

The number of machines enterprise security teams have to manage is exploding. When it comes to computing infrastructure, servers have been supplanted by virtual machines,…

Legitimate Security Tool Used Against Ukrainian Power Grid, Now Top Global Threat

Legitimate Security Tool Used Against Ukrainian Power Grid, Now Top Global Threat

Apr 26, 2022

Earlier this year, security researchers reported the use of legitimate security tools in multiple attacks against Ukrainian organizations, including government agencies, non-profits, and tech companies.…

What is the cyber kill chain? A model for tracing cyberattacks

What is the cyber kill chain? A model for tracing cyberattacks

Apr 14, 2022

As an infosec professional, you’ve likely heard about using a cyber kill chain to help identify and prevent intrusions. Attackers are evolving their methods, which…

6 Reasons Why More Automation Means More Secure Software

6 Reasons Why More Automation Means More Secure Software

Apr 11, 2022

In an age when applications are broken down into microservices, and networks are distributed across regions and clouds, software is being produced faster than ever, in…

Who’s selling SASE and what do you get?

Who’s selling SASE and what do you get?

Apr 7, 2022

Demand for secure access service edge (SASE) has grown tremendously during the pandemic. As adoption picks up, vendors are promising feature-rich and integrated SASE solutions. Customers have…

Physical Infrastructure Cybersecurity: A Growing Problem for Data Centers

Physical Infrastructure Cybersecurity: A Growing Problem for Data Centers

Apr 6, 2022

Modern data center infrastructure management (DCIM) platforms and other new tools put more power in the hands of facility managers. As a result, data centers…