Data Center

Data Center | News, how-tos, features, reviews, and videos

networking abstract
Conceptual rescue / recovery image   >   A flotation device drifts on a binary sea.


Kyndryl launches recovery retainer service for cyberattack response

Expert preparedness review and on-demand recovery assistance are featured in Kyndryl’s latest offering.

virtual network security picture id1208405529

Cato Networks launches SSE system with customizable DLP capabilities

Cato SSE 360 provides a security service edge offering that includes DLP (data loss prevention) features based on customizable rules.

2 linux malware scarier

Hackers using stealthy Linux backdoor Symbiote to steal credentials

Symbiote is deployed as a shared object that can inject itself into existing processes, making it difficult to detect.


RSA: Intel reference design to accelerate SASE, other security tasks

Intel says its reference design will enable accelerator cards to offload security processing from server CPUs without requiring more rack space.

2 linux malware scarier

Linux malware is on the rise—6 types of attacks to look for

Malware targeting Linux environments has increased massively in the past year, with threat actors using a variety of techniques to carry out operations.

20151027 red hat logo

Red Hat debuts edge features for Linux, Kubernetes platform security

At its annual Summit event, Red Hat is rolling out new edge-computing features for the company’s well-known enterprise Linux distribution, and security features for its Advanced Cluster Security for Kubernetes platform.

hybrid cloud

Dell offers data, app recovery support for multicloud assets

Dell is adding data recovery solutions to its APEX portfolio, for data centers and public clouds including Azure and AWS.

emergency disaster recovery business continuity binary by mjfelt getty images 538726573

Kyndryl rolls out Dell partnership for disaster recovery and security

New offering aims to synchronize disaster recovery and business continuity with cybersecurity.

data pipeline primary

Dirty Pipe root Linux vulnerability can also impact containers

Researchers have shown that the Dirty Pipe vulnerability can be used to modify protected files and gain root rights.

CSO > cloud computing / backups / data center / server racks / data transfer

Redstor extends protection of Kubernetes in AWS, unifies container backups

New support for Amazon EKS enables partners to scale back ups rapidly without complex scripting and removes need to bolt together multiple solutions.

Linux security shield

Dangerous privilege escalation bugs found in Linux package manager Snap

Newly discovered Snap flaw allows a low-privileged user to gain root access.

Linux security shield

Serious PwnKit flaw in default Linux installations requires urgent patching

Attackers could gain root privileges by compromising any regular user account. Workarounds are available, patches on their way.

Edge Computing

SASE in the spotlight as businesses prioritize edge network security

A new report discovers edge network definitions are in flux across industries as organizations look to augment traditional security controls to address edge network risks.

computer keyboard delete trash

Machine as insider threat: Lessons from Kyoto University’s backup data deletion

Kyoto University lost terabytes of data in a machine-as-an-insider scenario triggered by human error. Here are questions CISOs should ask to avoid a similar situation.

An image of an Australian map includes Tasmania [altas style, Australia]

Australia is putting cyber at the heart of its new realpolitik as it works to counter China

Data security and infrastructure resilience are enmeshed with Australia’s regional leadership.

Tech Spotlight   >   Cloud [IFW]   >   Conceptual image of IoT cloud services.

BusyBox flaws highlight need for consistent IoT updates

Some of the 14 vulnerabilities could result in remote code execution or denial of service attacks.

spot edgecomputing cso by 4 pm production shutterstock 2400x1600 primary 3

Securing the edge: 4 trends to watch

The global COVID-19 pandemic exacerbated some of the security risks associated with the move to a more distributed computing model. Here are 4 ways security organizations are responding as edge computing threats evolve.

continuity data backup network server banking

Ransomware recovery: 8 steps to successfully restore from backup

The best way to recover from a ransomware attack is to have a reliable and fast backup process. Here's how to do it.

Load More
You Might Also Like