Latest Cybersecurity Articles

The BlueKeep Vulnerability and Data Centers: What You Need to Know

The BlueKeep Vulnerability and Data Centers: What You Need to Know

Jul 16, 2019

Experts warn that BlueKeep attacks are on their way, and at least a million machines are vulnerable.

How to close SIEM visibility gaps created by legacy apps

How to close SIEM visibility gaps created by legacy apps

Jul 16, 2019

It’s often difficult to make log files and other data from legacy applications accessible to security information and event management systems. Here are some options…

4 security concerns for low-code and no-code development

4 security concerns for low-code and no-code development

Jun 24, 2019

Low code does not mean low risk. By allowing more people in an enterprise to develop applications, low-code development creates new vulnerabilities and can hide…

Cloud Configurations Continue to Pose Data Center Security Challenges

Cloud Configurations Continue to Pose Data Center Security Challenges

Jun 12, 2019

Recent studies and surveys indicate that improperly configured public cloud instances continue to turn sensitive data into low hanging fruit.

Cloud’s Cybersecurity Challenges and Opportunities

Cloud’s Cybersecurity Challenges and Opportunities

Jun 10, 2019

As more data center managers move to private, public, and hybrid cloud infrastructures, new security challenges emerge, but clouds also offer new technologies to help…

6 ways malware can bypass endpoint protection

6 ways malware can bypass endpoint protection

Jun 10, 2019

Breaches from attacks that defeat or run around endpoint protection measures are on the rise. Here’s how attackers do it.

The Four Main Types of Cyberattack That Affect Data Center Uptime

The Four Main Types of Cyberattack That Affect Data Center Uptime

Jun 4, 2019

Here are the most common types of attack that bring down data centers.

How First Citrus Bank got rid of employee passwords

How First Citrus Bank got rid of employee passwords

Jun 4, 2019

The Florida bank rolled out passwordless authentication in February that relies on device biometrics of their smartphones.

Why It’s Time to Prepare for AI Wielding Hackers

Why It’s Time to Prepare for AI Wielding Hackers

Jun 3, 2019

In the AI-fueled security wars, most of the arsenal is currently in the hands of the good guys, but the balance of power might soon…

Investors Pour Money into Startups Killing the Data Center Firewall

Investors Pour Money into Startups Killing the Data Center Firewall

May 23, 2019

Micro-segmentation company Guardicore raised $60 million this week, but it’s not alone.

Here’s How ZombieLoad Affects Data Centers and What to Do About It

Here’s How ZombieLoad Affects Data Centers and What to Do About It

May 16, 2019

Experts say exploits would be sophisticated and take a long time to build, but operators should act now.

SIEM Pricing Models Set for a Shake-Up

SIEM Pricing Models Set for a Shake-Up

May 14, 2019

Next-gen SIEM providers eyeing incumbents with new tech features, modern takes on pricing

Verizon Releases Its Biggest Cyberthreat Trends Report Ever

Verizon Releases Its Biggest Cyberthreat Trends Report Ever

May 8, 2019

Ransomware remains the dominant form of cyberattack and phishing attacks now have more impact, despite more awareness.

What is GPS spoofing? And how you can defend against it

What is GPS spoofing? And how you can defend against it

May 7, 2019

The U.S. Global Positioning System, part of a network of global navigation satellite systems (GNSS), is vulnerable to attacks that could disrupt many industries. Here’s…

How Data Centers Can Use the New Smart Cybersecurity Tools

How Data Centers Can Use the New Smart Cybersecurity Tools

May 1, 2019

Attackers are smarter and attacks are more powerful, but so are the tools used to fight them.

The Ideal Data Center Access Control Device May Be in Your Pocket

The Ideal Data Center Access Control Device May Be in Your Pocket

Apr 23, 2019

You already use your phone to pay for groceries, so why not also use it to access your server room?

What Data Center Managers Can Learn from the Wipro Fishing Attack

What Data Center Managers Can Learn from the Wipro Fishing Attack

Apr 17, 2019

India-based technology giant Wipro, which offers a “boundaryless data center” among its services, has  fallen victim to a phishing attack  that may have led to…

Google expands cloud security capabilities, including simpler configuration

Google expands cloud security capabilities, including simpler configuration

Apr 10, 2019

New tools and services will help make it easier for enterprises to manage security with Google products as well as with Amazon and in their…

Google’s New Security Features Don’t Care Whose Data Center You’re In

Google’s New Security Features Don’t Care Whose Data Center You’re In

Apr 10, 2019

The company extends its security capabilities beyond services running in its own cloud.

What is AI fuzzing? And why it may be the next big cybersecurity threat

What is AI fuzzing? And why it may be the next big cybersecurity threat

Mar 26, 2019

Pairing artificial intelligence or machine learning with traditional fuzzing techniques creates a powerful tool to find application or system vulnerabilities — for both researchers and…

What We Can Learn from the Ransomware Attack That Crippled Norsk Hydro

What We Can Learn from the Ransomware Attack That Crippled Norsk Hydro

Mar 25, 2019

Cryptojacking may be the hot new trend in large-scale cybercrime, but ransomware is still alive and well.

Edge Computing Is a New Frontier for Cybersecurity

Edge Computing Is a New Frontier for Cybersecurity

Mar 20, 2019

Distributed, ubiquitous computing infrastructure can come at the price of a much bigger attack surface.

The Must-Haves for Your Data Center Cybersecurity Checklist

The Must-Haves for Your Data Center Cybersecurity Checklist

Mar 13, 2019

Explaining the NIST Cybersecurity Framework, the most popular of its kind.

What is quantum cryptography? It’s no silver bullet, but could improve security

What is quantum cryptography? It’s no silver bullet, but could improve security

Mar 12, 2019

In the arms race between white and black hats, the infosec industry looks to quantum cryptography and quantum key distribution (QKD). That may be just…

Can Google Become the Next Big Cybersecurity Vendor?

Can Google Become the Next Big Cybersecurity Vendor?

Mar 6, 2019

Backstory, a nascent Google cybersecurity unit’s first product, aims to protect enterprise infrastructure on-prem and in the cloud.

Bare-Metal Cloud Firmware Security Fail Isn’t Limited to IBM — by Far

Bare-Metal Cloud Firmware Security Fail Isn’t Limited to IBM — by Far

Mar 5, 2019

“This is really a broader industry concern about the firmware layer being effectively ignored by almost everybody.”

Is Your Data Center Power System Protected from Cyberattacks?

Is Your Data Center Power System Protected from Cyberattacks?

Feb 26, 2019

The most critical infrastructure in the data center also happens to be the most overlooked one by cybersecurity teams.

Should There Be ‘Safe Harbor’ Against Data-Breach Lawsuits?

Should There Be ‘Safe Harbor’ Against Data-Breach Lawsuits?

Feb 19, 2019

New law on the books in Ohio protects firms that have suffered cyberattacks from being sued if they follow best practices.

What is biometrics? And why collecting biometric data is risky

What is biometrics? And why collecting biometric data is risky

Feb 12, 2019

Biometrics has the potential to make authentication dramatically faster, easier and more secure than traditional passwords, but companies need to be careful about the biometric…

Here’s What Cybersecurity Experts Worry About This Year

Here’s What Cybersecurity Experts Worry About This Year

Feb 8, 2019

Cybercrime is getting cheaper and easier, and more players are getting into the business, while enterprise attack surface is growing.