CCPA and GDPR: The Data Center Pitfalls of the ‘Right to be Forgotten’
Compliance with the new privacy rules doesn’t always fall on data center managers, but when it does, it’s more difficult than it may sound.
9 CCPA questions every CISO should be prepared to answer
Executive management anxiety over the California Consumer Privacy Act will rise as the enforcement deadline looms. Security managers will need to know the answers to…
Should Data Centers Have Common Physical Infrastructure Security Standards?
If the industry doesn’t formulate a set of standards for securing critical infrastructure, regulators might.
Say Goodbye to Windows Server 2008 — and Hello to Azure?
As Microsoft prepares to end support for the widely installed OS, here are the key security considerations.
Google Details Its Zero-Trust Architecture. Can Enterprises Use It?
The firewall is dead, and zero trust is here to replace it. But Google’s BeyondProd is only one way to skin the zero-trust cat.
CyrusOne Confirms Ransomware Attack, Says Six Customers Affected
The attack was limited to its managed services business in a single New York data center, the company said.
With Aporeto, Palo Alto Looks Away from the Firewall and Toward the Future
Seeing its firewall sales softening, the security vendor makes another acquisition to reorient itself for the cloud era.
Google’s OpenTitan Chip Could Make Data Centers More Secure… Someday
Based on the secure chip in Pixel phones, the recently open sourced project holds promise for data center hardware.
What you need to know about the new OWASP API Security Top 10 list
APIs now account for 40% of the attack surface for all web-enabled apps. OWASP has identified 10 areas where enterprises can lower that risk.
Technical Debt: A Data Center Security Risk You Can’t Afford
Legacy applications can leave massive security holes and must be dealt with, no matter how critical they are.
How enterprises navigate GDPR data management rules
TECHTARGET–For businesses that operate in the European Union, complying with GDPR has to be a top priority. In many of these organizations, the burden is…
Survey: Most Data Center Managers Rely on Outdated Security Practices
While experts aren’t surprised, they recommend adding the latest tools to your security strategy now.
How Ethical Hacking Can Strengthen Your Data Center Security
White hat hackers can be extremely useful, as long as you stay within certain guardrails.
What Data Center Managers Can Do to Secure APIs, the New Perimeter
APIs make for a more feature-rich and dynamics world of applications, but they also increase attack surface.
Directory traversal explained: Definition, examples and prevention
Jira is just the most recent company to expose its customers via a path traversal vulnerability. This risk is easily avoidable, but developers keep making…
7 ways 5G mobile networks will change IoT security, and how to prepare
Every internet of things security issue will be greatly magnified in a 5G environment. Address these seven areas before you deploy your own.
Do Oracle Cloud’s “No-Oracle-Code” Servers Make It More Secure?
Taking a closer look at Larry Ellison’s claim of a superior, “fundamentally different” cloud architecture.
Business email compromise attacks cost millions, losses doubling each year
Cybercriminals follow the money, and you need look no further than Toyota Boshoku’s recent $37 million loss to see why many are turning to BEC…
Oracle’s Autonomous Cloud Security Claims Met with Skepticism
Is it really possible to eliminate data breaches by eliminating human operators, and would Oracle be the one to do it?
Rich PII enables sophisticated impersonation attacks
Hackers are now using rich personally identifying information, including device types and browser versions, cookies and web histories, and even voice recordings to gain account…
Micro-Segmentation Is Complicated, So Vonage Turned to Machine Learning for Help
Machine learning goes hand-in-hand with the new essential network security strategy.
Latest Data Center Network Security Strategies Revolve Around Intelligence
Intelligent tools are the only way to stay abreast of the current rate of change in the network.
How to Plug the Latest Supermicro Server Security Hole
The vulnerability gives attackers a way in through the internet, but that’s not the whole extent of the risk.
How AI Fuzzing Can Protect a Data Center or Be Its Worst Enemy
Manual penetration testing is quickly becoming obsolete, with AI-powered tools offering a way to cover the bases.
How secure are your AI and machine learning projects?
When enterprises adopt new technology, security is often on the back burner. It can seem more important to get new products or services to customers…
6 ways cybercriminals use commercial infrastructure
Whether through fraud or legitimate purchase, cybercriminals increasingly depend on mainstream services to support their activities.
Privacy and Security are Converging in the Data Center
New regulations like GDPR and CCPA can have a positive effect on security, but they can also get in the way of developing smart security…
The Evite Breach Demonstrates the Risk of Losing Track of Old Data
Old data may not be of much value to a business, but it can command top bitcoin on the dark web.
6 API security lessons from the Venmo breach
Cyber criminals are targeting application programming interfaces to steal sensitive data. Recent exposures and hacks at companies like Venmo, Facebook and Google present lessons to…
Why the WhatsApp Security Flaw Should Make Enterprise IT Nervous
The vulnerability is a reminder that apps on your employee’s phones represent a huge attack surface for your enterprise network.