Bugs in the data center: How social engineering impacts physical security

Bugs in the data center: How social engineering impacts physical security

Maria KorolovJun 9, 2022

One data center management team learned the hard way that bugs can be a menace — or, to be more…

Latest AI articles

9 ways hackers will use machine learning to launch attacks

9 ways hackers will use machine learning to launch attacks

Jun 13, 2022

Machine learning and artificial intelligence (AI) are becoming a core technology for some threat detection and response tools. The ability to learn on the fly and automatically adapt to changing cyberthreats give security teams an advantage. However, some threat actors are also using machine learning and AI a to scale up their cyberattacks, evade security controls, and find new vulnerabilities all at an unprecedented pace and to devastating results. Here are the nine most common ways attackers leverage these technologies. 1. Spam, spam,…

6 business risks of shortchanging AI ethics and governance

6 business risks of shortchanging AI ethics and governance

May 17, 2022
Factors inherent to artificial intelligence and its implementation can have dire ramifications for your company if ethics and governance aren’t baked into your AI strategy.
How SASE uses AI

How SASE uses AI

Apr 18, 2022
SASE vendors are applying AI and machine learning to the network- and security-related data they collect to sharpen analytics, tighten security and boost performance.
Why businesses should know the importance of data quality

Why businesses should know the importance of data quality

Apr 13, 2022
Data quality, building data trust and identifying bias are critical for organizations to confidently make decisions based on the data they collect.

Latest Cybersecurity articles

9 ways hackers will use machine learning to launch attacks

9 ways hackers will use machine learning to launch attacks

Jun 13, 2022

Machine learning and artificial intelligence (AI) are becoming a core technology for some threat detection and response tools. The ability to learn on the fly and automatically adapt to changing cyberthreats give security teams an advantage. However, some threat actors are also using machine learning and AI a to scale up their cyberattacks, evade security controls, and find new vulnerabilities all at an unprecedented pace and to devastating results. Here are the nine most common ways attackers leverage these technologies. 1. Spam, spam, spam, spam Defenders have been using machine learning to detect spam for decades, says Fernando Montenegro, analyst…

Fantastic Open Source Cybersecurity Tools and Where to Find Them

Fantastic Open Source Cybersecurity Tools and Where to Find Them

May 19, 2022
Open source software plays a key role in keeping data centers secure. Here are just a few projects making a difference.
Microchip Adds Real-Time Security to Its Root of Trust Silicon Tech

Microchip Adds Real-Time Security to Its Root of Trust Silicon Tech

May 17, 2022
And it is not the only company to take hardware security seriously.
Machine Identity Management: A Fast-Growing Frontier of Security

Machine Identity Management: A Fast-Growing Frontier of Security

May 5, 2022
Attackers are getting better at compromising machine identities, as billions of new devices and services are introduced to the network.

Latest Networking articles

How SASE uses AI

How SASE uses AI

Apr 18, 2022

Secure access service edge, or SASE, combines networking and security into a cloud-based service, and it’s growing fast. According to Gartner projections, enterprise spending on SASE will hit almost $7 billion this year, up from under $5 billion in 2021. Gartner also predicts that more than 50% of organizations will have strategies to adopt SASE by 2025, up from less than 5% in 2020. The five core components of the SASE stack are SD-WAN, firewall-as-a-service (FWaaS), secure web gateway (SWG), cloud access security broker (CASB), and zero trust network access (ZTNA). There’s also a sixth key technology that’s increasingly playing a big role…

Gartner: SSE is SASE minus the SD-WAN

Gartner: SSE is SASE minus the SD-WAN

Mar 7, 2022
Security service edge (SSE) bundles a cloud access security broker, secure web gateway and ZTNA, according to Gartner.
Top 10 outages of 2021

Top 10 outages of 2021

Jan 31, 2022
Cisco-owned network intelligence company ThousandEyes reveals the 10 biggest outages of 2021.
Space is the final frontier for data centers

Space is the final frontier for data centers

Jan 18, 2022
Last year marked the first time humanity deployed a conventional data center in space. The HPE Spaceborne Computer-2 – a set of HPE Edgeline Converged EL4000 Edge and HPE ProLiant machines, each with an Nvidia T4 GPU to support AI workloads – was sent to the International Space Station in February of 2021. This is …

Space is the final frontier for data centers Read More »

Latest Blog Posts

Body language master list for writers

Dec 17, 2020
Body language master list for writers

“Show, don’t tell” is the first lesson of Fiction Writing 101, and one of the easiest and quickest fixes is to replace the emotional adverbs and adjectives with some body language. For example, instead of “He said, sadly,” you could…

Resources for writers

Sep 7, 2020
Resources for writers

Our master list of best resources for writers of fantasy, horror and sci-fi. Writing advice sites Writer’s Knowledge Base:  Huge database of more than 40,000 articles about writing. Always my favorite place to start to research any writing problem (other…

MetaStellar site soft launch

Aug 6, 2020
MetaStellar site soft launch

We’ve just started doing the initial design of the website for MetaStellar, our new magazine of speculative fiction. The magazine will officially launch on September 1. It will pay authors of new, previously unpublished short fiction 8 cents per word…

14 Reasons to Use Google Docs to Write

Aug 3, 2020
14 Reasons to Use Google Docs to Write

I use Google Docs. Most writers use Microsoft Word, Scrivener, or Google Docs to write their novels, with a few other, lesser-known platforms thrown in. I also use other platforms, including Word and Filemaker — but I like Google Docs…

Writing Advice Sites

Aug 3, 2020
Writing Advice Sites

Our list of great sites for beginning speculative fiction writers. Writer’s Knowledge Base Huge database of more than 40,000 articles about writing. Always my favorite place to start to research any writing problem (other than Google, of course). These are…

Do I quote vendors in articles?

Jun 4, 2020
Do I quote vendors in articles?

(Image courtesy Geralt via Pixabay.) This question has been coming up a lot lately, and there’s a whole speech I give about this, so I thought I’d write it down and just refer people to this…