Protect your data center from cyber threats with expert advice and insights on data center security best practices. Stay informed with Data Center Knowledge.
A critical vulnerability in the Log4j library is impacting organizations worldwide. Here are steps you can take to protect yourself from the Log4Shell flaw and others like it.
Hackers rush to exploit the vulnerability to steal data, deploy ransomware, install back doors, create botnets, mine cryptocurrencies, and conduct other illegal activities.
The rapid deployment of 5G and edge computing, the transition to work-from-home, combined with accelerating growth of mobile apps, APIs and web services are expanding the attack surface for cyber criminals. Are we prepared?
The Russian state actors behind last year’s SolarWinds attack have been targeting IT resellers and service providers since at least May, according to a Microsoft report.
Are colocation facilities more or less secure than on-premises infrastructure or public clouds? Here’s a breakdown of their security advantages and disadvantages.
With the rise of work-from-home, SaaS, IoT, cloud, mobile and edge computing, the traditional on-premises identity and authentication systems are becoming obsolete, giving way to cloud identity.
Microsoft attributes the coordinated attack, which was first observed in May, to a group called Nobelium, the same state-sponsored Russian hackers responsible for the SolarWinds incident.