Data Center

Data Center | News, how-tos, features, reviews, and videos

2 linux malware scarier
Cybersecurity

2 linux malware scarier

Linux malware is on the rise—6 types of attacks to look for

Malware targeting Linux environments has increased massively in the past year, with threat actors using a variety of techniques to carry out operations.

20151027 red hat logo

Red Hat debuts edge features for Linux, Kubernetes platform security

At its annual Summit event, Red Hat is rolling out new edge-computing features for the company’s well-known enterprise Linux distribution, and security features for its Advanced Cluster Security for Kubernetes platform.

hybrid cloud

Dell offers data, app recovery support for multicloud assets

Dell is adding data recovery solutions to its APEX portfolio, for data centers and public clouds including Azure and AWS.

emergency disaster recovery business continuity binary by mjfelt getty images 538726573

Kyndryl rolls out Dell partnership for disaster recovery and security

New offering aims to synchronize disaster recovery and business continuity with cybersecurity.

data pipeline primary

Dirty Pipe root Linux vulnerability can also impact containers

Researchers have shown that the Dirty Pipe vulnerability can be used to modify protected files and gain root rights.

CSO > cloud computing / backups / data center / server racks / data transfer

Redstor extends protection of Kubernetes in AWS, unifies container backups

New support for Amazon EKS enables partners to scale back ups rapidly without complex scripting and removes need to bolt together multiple solutions.

Linux security shield

Dangerous privilege escalation bugs found in Linux package manager Snap

Newly discovered Snap flaw allows a low-privileged user to gain root access.

Linux security shield

Serious PwnKit flaw in default Linux installations requires urgent patching

Attackers could gain root privileges by compromising any regular user account. Workarounds are available, patches on their way.

Edge Computing

SASE in the spotlight as businesses prioritize edge network security

A new report discovers edge network definitions are in flux across industries as organizations look to augment traditional security controls to address edge network risks.

computer keyboard delete trash

Machine as insider threat: Lessons from Kyoto University’s backup data deletion

Kyoto University lost terabytes of data in a machine-as-an-insider scenario triggered by human error. Here are questions CISOs should ask to avoid a similar situation.

Tech Spotlight   >   Cloud [IFW]   >   Conceptual image of IoT cloud services.

BusyBox flaws highlight need for consistent IoT updates

Some of the 14 vulnerabilities could result in remote code execution or denial of service attacks.

spot edgecomputing cso by 4 pm production shutterstock 2400x1600 primary 3

Securing the edge: 4 trends to watch

The global COVID-19 pandemic exacerbated some of the security risks associated with the move to a more distributed computing model. Here are 4 ways security organizations are responding as edge computing threats evolve.

continuity data backup network server banking

Ransomware recovery: 8 steps to successfully restore from backup

The best way to recover from a ransomware attack is to have a reliable and fast backup process. Here's how to do it.

Microsoft Windows security  >  Windows laptop + logo with binary lock and key

PrintNightmare vulnerability explained: Exploits, patches, and workarounds

Public exploits are available for a remote code execution vulnerability in the Windows Print Spooler that could allow attackers to take full control of systems. The vulnerability affects all editions of Windows and organizations are...

typewriter are you ready prepare contingency disaster recovery

Tabletop exercises: Six sample scenarios

Tabletop exercises are a low-stress, high-impact way to test your plans for handling a crisis. Here are some tips for getting the most out of the process, plus six scenarios you can use to start your journey.

cloud security expert casb binary cloud computing cloud security by metamorworks getty

SASE is coming, but adoption will be slow (especially for large enterprises)

Smaller organizations eye SASE to provide secure access to applications. Lack of maturity, existing security and digital transformation investments give large enterprises pause on SASE.

storm disaster recovery disruption rain umbrella tornado challenge weather

Business continuity and disaster recovery planning: The basics

Good business continuity plans will keep your company up and running through interruptions of any kind: power failures, IT system crashes, natural disasters, pandemics and more.

CSO  >  secure mergers + acquisitions / floating puzzles pieces / abstract security mechanisms

7 critical IT policies you should have in place

Putting a framework of IT policies that should be the foundation of every company's security plan.

Load More
You Might Also Like