Latest Cybersecurity Articles

How to Avoid Paying Ransomware Ransoms

How to Avoid Paying Ransomware Ransoms

Last month, two agencies of the US Treasury department issued advisories warning against paying ransomware. The Office of Foreign Assets Control  said  that by paying…

Is the VPN Dead? No, It’s Doing Quite Well, Actually

Is the VPN Dead? No, It’s Doing Quite Well, Actually

VPNs are very useful for securing connections when employees log in from hotels, airports, and cafes, but that’s not really happening much these days, is…

How to protect backups from ransomware

How to protect backups from ransomware

Despite a recent decline in attacks,  ransomware  still poses significant threats to enterprises, as the  attacks against several major newspapers  demonstrated this month. It is…

Who’s selling SASE and what do you get?

Who’s selling SASE and what do you get?

Secure access service edge (SASE) architecture rolls networking and security into a cloud service, making it easier for enterprises to provide simple, secure access to…

Supply chain attacks show why you should be wary of third-party providers

Supply chain attacks show why you should be wary of third-party providers

A supply chain attack, also called a value-chain or third-party attack, occurs when someone infiltrates your system through an outside partner or provider with access…

Cisco Router Vulnerability Puts Network Segmentation at Risk

Cisco Router Vulnerability Puts Network Segmentation at Risk

Data centers using Cisco routers with the IOS XR software need to be on alert. Cisco issued a  warning  last week that attackers were actively…

Intel’s Ice Lake Chips to Enable Confidential Computing on Data Center-Grade Servers

Intel’s Ice Lake Chips to Enable Confidential Computing on Data Center-Grade Servers

Confidential computing for enterprise-grade servers took a big step forward in the summer, when Google Cloud announced it was leveraging the AMD 2nd Gen Epyc…

Another Gang Hides Ransomware Inside Virtual Machines

Another Gang Hides Ransomware Inside Virtual Machines

Late last spring the cybercriminals behind the Ragnar Locker ransomware  used a virtual machine to evade detection, specifically an Oracle VirtualBox with Window XP inside.…

How AI Is Used in Data Center Physical Security Today

How AI Is Used in Data Center Physical Security Today

Machine learning and artificial intelligence are touted as the cure-all for everything that ails a data center. White much of it is hype and baseless…

Zerologon Vulnerability Spurs Rare DHS CISA Emergency Order

Zerologon Vulnerability Spurs Rare DHS CISA Emergency Order

Cybersecurity and Infrastructure Security Agency, part of the US Department of Homeland Security, doesn’t usually issue emergency orders about specific vulnerabilities. But it issued one…

Netwalker, the Powerful New Strain of Ransomware Used Against Equinix

Netwalker, the Powerful New Strain of Ransomware Used Against Equinix

In a statement published on its website, Equinix said that the  ransomware attack on its infrastructure  disclosed earlier this month has been fully contained, with…

Take Off Your Mask and Smile at the AI, Data Center Visitor

Take Off Your Mask and Smile at the AI, Data Center Visitor

AI-powered facial recognition has been getting bad rap lately due to some significant concerns about bias and privacy. But that shouldn’t deter data center managers…

What is SASE? A cloud service that marries SD-WAN with security

What is SASE? A cloud service that marries SD-WAN with security

Secure access service edge (SASE) is a network architecture that rolls software-defined wide area networking (SD-WAN) and security into a cloud service that promises simplified…

IBM, Intel, AMD take different routes to hardware-based encryption

IBM, Intel, AMD take different routes to hardware-based encryption

We have encryption for data in motion. We have encryption for data at rest. But one type of data is difficult to keep encrypted –…

Why Some Data Centers Don’t Patch and Why They Should

Why Some Data Centers Don’t Patch and Why They Should

In early 2019,  Pulse Secure released a patch for a VPN server vulnerability. The company contacted customers by phone, email, in-product alerts, and online notifications…

Getting started with security automation

Getting started with security automation

Network engineer Jose Arellano concedes that “the hardest part of my day” is keeping the network safe for 12,700 students, 1,900 staff and more than…

Hackers Can Turn Off Your Dell Servers Remotely Using the Newly Found iDRAC Vulnerability

Hackers Can Turn Off Your Dell Servers Remotely Using the Newly Found iDRAC Vulnerability

A recently discovered security vulnerability in remote-access firmware on Dell servers can give hackers full access to the same systems data center managers use, enabling…

Confidential Computing, the Next Big Thing Making Cloud Less Scary for Enterprises

Confidential Computing, the Next Big Thing Making Cloud Less Scary for Enterprises

Google Cloud’s new AMD-enabled confidential computing offering isn’t the only attempt around to protect data while in use by applications. All the major cloud vendors,…

Why Google Cloud Turned to AMD to Solve for Runtime Encryption

Why Google Cloud Turned to AMD to Solve for Runtime Encryption

As more and more companies look for end-to-end encryption in order to secure their data and operations and to meet compliance requirements, they work against…

California Consumer Privacy Act (CCPA): What you need to know to be compliant

California Consumer Privacy Act (CCPA): What you need to know to be compliant

In late June, 2018, California passed a consumer privacy act, AB 375, that could have more repercussions on U.S. companies than the European Union’s General…

Hackers Use Java to Hide Malware on the Data Center Network

Hackers Use Java to Hide Malware on the Data Center Network

Last week, the US Department of Homeland Security warned of attackers using remote desktop servers to attack data centers. “Due to the level of access…

VMware Cloud Director Vulnerability Allows Data Center Takeovers

VMware Cloud Director Vulnerability Allows Data Center Takeovers

A newly discovered vulnerability in VMware Cloud Director allows attackers who have compromised one account to spread to all the other accounts in a data…

New Malware Makes Air-Gapped Data Center Networks Less Bulletproof

New Malware Makes Air-Gapped Data Center Networks Less Bulletproof

“Air gapping,” or isolating certain systems by keeping them disconnected from the public internet, or any other networks, including your own, has for years been…

New Malware Hides Inside Rogue Virtual Machines

New Malware Hides Inside Rogue Virtual Machines

Malware developers have a new trick up their sleeve when it comes to evading detection — hiding their code inside a virtual machine. Researchers at…

8 ways to get more life out of an old SIEM

8 ways to get more life out of an old SIEM

As the COVID-19 pandemic drags global economies to a halt, enterprises are having to tighten their belts across the board, including in IT. In May…

SASE helps healthcare company pivot to support remote workers

SASE helps healthcare company pivot to support remote workers

Security and performance concerns made it challenging for TrialCard to enable its employees to work from home when the COVID-19 pandemic hit. Customer service agents…

Enterprises look to SASE to bolster security for remote workers

Enterprises look to SASE to bolster security for remote workers

The coronavirus pandemic has accelerated some  companies’ plans to adopt secure access service edge (SASE). Last summer, Gartner estimated SASE adoption at less than 1%…

Octarine Acquisition to Boost VMware’s Kubernetes Security Play

Octarine Acquisition to Boost VMware’s Kubernetes Security Play

VMware’s acquisition of the Kubernetes security startup Octarine reflects a shift in cybersecurity, driven by containerization of applications. “The focus is no longer about machines,…

Five Tips for Remote Data Center Manager Security During the Pandemic

Five Tips for Remote Data Center Manager Security During the Pandemic

As data center operators rushed to get all but the most essential employees working remotely, some security issues may have been overlooked. Now that most…

Hackers Exploiting SaltStack Vulnerability Hit Data Centers

Hackers Exploiting SaltStack Vulnerability Hit Data Centers

After infrastructure automation software vendor SaltStack released a patch for two critical vulnerabilities last Wednesday, hackers acted quickly to reverse engineer the exploit and attack…