Foiled AWS Data Center Bombing Plot Poses New Questions for Operators
Following the recent arrest of a man who was allegedly plotting to blow up an AWS data center, operators of computing facilities — and other…
Malware Wants to Phone Home. Trinity Cyber Doesn’t Try to Block It
The SolarWinds breach, discovered last year, demonstrated how, with enough sophistication, malware can “phone home” for years, completely undetected. The hackers found ways around the…
HPE OneView: An Overview of the Popular IT Management Platform
Cloud infrastructure customers can get all their computing resources in one place — computing, storage, and networking. It’s one of the biggest ultimate benefits virtualization…
Emotet May Be Gone, But the Security Holes It Made Could Still Be Lingering in Data Centers
In January, an international group of law-enforcement agencies took down Emotet, the world’s top malware. Authorities took over its command-and-control servers and installed a kill…
An Adobe Flash Ghost May Be Haunting Your Data Center
Adobe’s Flash Player officially hit its end of life on January 1, 2021. It was a security risk while it was still alive. To data…
Microsoft Exchange Hack Could Be Worse Than SolarWinds
The scope of damage from the newly public Microsoft Exchange vulnerability keeps growing, with some experts saying that it is “worse than SolarWinds.” As of…
What Is Zscaler and How Does It Secure Enterprise Networks?
Zscaler saw unprecedented growth last year, replacing legacy networking platforms with its scalable cloud-based alternative at breakneck speed. Today, the company serves more than a…
WAN challenges steer auto-rental firm to SASE
Latency and reliability concerns set car rental company Sixt on a path to rearchitect its WAN. That led the global company, which has locations in…
Critical VMware vSphere Vulnerability Is a Must-Patch
VMware this week fixed two critical vulnerabilities in jts vCenter Server, used by data centers to manage the VMware vSphere server virtualization platform. VMware is…
Managing Encryption for Data Centers Is Hard. And It Will Get Harder
Give up on trying to do it all yourself and leave it to the experts. Encryption is a core tenet for cybersecurity. Attackers can’t steal…
AI-Wielding Hackers are Here
In the summer of 2019, I wrote about the coming threat of AI-wielding hackers. I predicted that hackers would soon be using artificial intelligence to…
5 ways attackers counter incident response, and how to stop them
Last month, the UK’s National Cyber Security Centre reported that one organization paid nearly $9 million to attackers for a decryption key after falling victim…
How strong, flexible data protection controls can help maintain regulatory compliance
Privacy and security regulations are evolving quickly. The European Union’s GDPR and California’s new CPRA law are only the most high-profile examples. According to Privacy…
Supply chain attacks show why you should be wary of third-party providers
What is a supply chain attack? A supply chain attack, also called a value-chain or third-party attack, occurs when someone infiltrates your system through an…
Quantum Teleportation Makes Progress, But Toward What?
In what they described as a key milestone on the way to redefining global communications, a group of researchers recently managed to teleport quantum states…
The SolarWinds Breach Is Shaking Up Incident Response
The massive SolarWinds breach exposed some significant weaknesses in companies’ incident response practices. Responding to a cyberattack like SolarWinds, where a software update process in…
Intel Says Its SGX Secure Enclaves Shine in Bare Metal Deployments
Last summer, Google announced that it was using AMD’s 2nd Gen Epyc chip to offer protected computing environments to its cloud customers. This approach, also…
What are Supply Chain Attacks, and How to Guard Against Them
Remediation of the fallout from the massive breach of SolarWinds network management tools — which affected up to 18,000 organizations — could cost companies billions.…
10 Cybersecurity Threats Enterprise IT Should Watch Out for in 2021
Ransomware, COVID-19, and nation-state attacks made 2020 a banner year for cybercrime. Many organizations were caught unprepared, even though there had been plenty of warnings…
The List of Known SolarWinds Breach Victims Grows, as Do Attack Vectors
The SolarWinds breach story continues to get worse. The list of known victims now includes US departments of Commerce, Defense, Energy, Homeland Security, State, the…
CPRA explained: New California privacy law ramps up restrictions on data use
In November, Californians approved a ballot measure, Proposition 24, a.k.a. the California Privacy Rights Act (CPRA), to create a new consumer data privacy agency. It…
What Data Center IT Security Pros Must Know About the SolarWinds Vulnerability
On Sunday, we learned that federal agencies and other organizations had been penetrated by nation-state attackers, identified as Russian by multiple sources. Though the definitive…
The Pandemic Struck, and Cyber Criminals Went to Work
As the world’s attention was focused elsewhere, cyber criminals went on a major offensive, keeping enterprise security teams around the world on their toes. According…
Remote Data Center Management Tools Must Learn to Play Together
Data center technology vendors usually offer remote monitoring or management tools for their products. They’ve also gotten better at providing APIs for easier access by…
Remote Data Center Management Investments Pay Off in the Pandemic
The pandemic has put the value of remote data center management and monitoring tools on display. Use of this category of data center technology has…
How secure are your AI and machine learning projects?
When enterprises adopt new technology, security is often on the back burner. It can seem more important to get new products or services to customers…
Remote Data Center Management Tools are No Longer Optional
Before the COVID-19 pandemic, remote data center management tools were optional, and many data center managers held off on the more powerful options due to…
Open Compute Project Releases Hardware Root of Trust Spec for Data Centers
The Open Compute Project is adding chip security to the range of data center technologies covered by its open source specifications, developed largely for and…
How to Avoid Paying Ransomware Ransoms
Last month, two agencies of the US Treasury department issued advisories warning against paying ransomware. The Office of Foreign Assets Control said that by paying…
Is the VPN Dead? No, It’s Doing Quite Well, Actually
VPNs are very useful for securing connections when employees log in from hotels, airports, and cafes, but that’s not really happening much these days, is…