SASE helps global car-rental company Sixt strengthen its network security architecture and ride out COVID-19 challenges.
DATA CENTER KNOWLEDGE—”It’s really the highest possible risk we have, and exploitation is very simple.”
DATA CENTER KNOWLEDGE—With multi-cloud already here and quantum computing on the horizon, most should probably leave encryption to the experts.
DATA CENTER KNOWLEDGE—Intelligent cybercrime tools exit proof of concept.
CSO ONLINE—IR has become a chess match with attackers who can cleverly spoil responders’ efforts and keep a foothold in systems. Here’s how they do it and how to kick them out for good.
CSO ONLINE—An effective approach to data protection controls embraces ethical standards and anticipates new requirements. Here’s how some CISOs and other experts tackle the issue.
CSO ONLINE—The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.
DATA CENTER KNOWLEDGE—What could scientists’ recent success in teleporting quantum states mean for data centers of the future?
DATA CENTER KNOWLEDGE—The attack exposed big weaknesses, creating an opportunity for enterprises to address them.
DATA CENTER KNOWLEDGE—Bare metal is making a comeback, and Intel says its chip-based confidential computing fits better than VM-based alternatives.
DATA CENTER KNOWLEDGE—The three basic categories of supply chain attacks, why they’re especially devastating, and what can be done to guard against them.
DATA CENTER KNOWLEDGE—Ransomware, the pandemic, and government hackers made 2020 a banner year for cybercrime. Here’s what security experts say is in store for this year.
DATA CENTER KNOWLEDGE—Concerns mount that SolarWinds may not have been the only IT vendor used to build backdoors into enterprise networks.
CSO ONLINE—The California Privacy Rights Act more closely aligns with the EU’s General Data Protection Regulation. Mid-sized companies not yet GDPR compliant face the biggest impact.
DATA CENTER KNOWLEDGE—The unprecedented attack, whose full scope is yet to be determined, gave those behind it access to some of the most sensitive enterprise systems.