technology

What’s new in ransomware?

In June, South Korean hosting company Internet Nayana, Inc., was  hit by a ransomware attack  that took down its 153 Linux web servers — home to more than 5,000 customer websites. “I know that negotiations with hackers should not be done,” company CEO Hwang Chilghong said in a statement. “I would not negotiate with a […]

What’s new in ransomware? Read More »

What Europe’s New Data Protection Law Means for Data Center Operators

The new  European General Data Protection Regulation  goes into effect next May and applies to any company, anywhere in the world, that collects sensitive data about European customers or employees. GDPR also comes with onerous breach notification requirements and high penalties for failing to comply, and data center operators may become prime targets for regulators’

What Europe’s New Data Protection Law Means for Data Center Operators Read More »

Quantum Computing Could Make Today’s Encryption Obsolete

Researchers at top university and corporate labs around the world are in a furious race to create the first practical, usable quantum computer. Quantum computers — which use quantum bits, or qubits — are capable of running computations impossible for existing technology. It promises to open up new possibilities in areas like medical research, artificial

Quantum Computing Could Make Today’s Encryption Obsolete Read More »

Two years after the OPM data breach: What government agencies must do now

The Office of Personnel Management breach in June 2015 was a big wake up call to our federal government, and, in its wake, a number of initiatives were launched to improve the government’s cybersecurity posture. Despite several concrete improvements, progress has stalled in some areas, as demonstrated by a series of assessments conducted since the

Two years after the OPM data breach: What government agencies must do now Read More »

With new dynamic capabilities, will whitelisting finally catch on?

Everybody knows and hates whitelisting. Employees are only allowed to install approved software on their desktops and laptops, so they’re always complaining and asking for exceptions. Management eventually gets fed up with it and stops the experiment. For mobile devices, enterprises have a number of tools at their disposal, including mobile device management. In addition,

With new dynamic capabilities, will whitelisting finally catch on? Read More »