Data Center
Data Center | News, how-tos, features, reviews, and videos
Linux malware is on the rise—6 types of attacks to look for
Malware targeting Linux environments has increased massively in the past year, with threat actors using a variety of techniques to carry out operations.
Red Hat debuts edge features for Linux, Kubernetes platform security
At its annual Summit event, Red Hat is rolling out new edge-computing features for the company’s well-known enterprise Linux distribution, and security features for its Advanced Cluster Security for Kubernetes platform.
Dell offers data, app recovery support for multicloud assets
Dell is adding data recovery solutions to its APEX portfolio, for data centers and public clouds including Azure and AWS.
Kyndryl rolls out Dell partnership for disaster recovery and security
New offering aims to synchronize disaster recovery and business continuity with cybersecurity.
Dirty Pipe root Linux vulnerability can also impact containers
Researchers have shown that the Dirty Pipe vulnerability can be used to modify protected files and gain root rights.
Redstor extends protection of Kubernetes in AWS, unifies container backups
New support for Amazon EKS enables partners to scale back ups rapidly without complex scripting and removes need to bolt together multiple solutions.
Dangerous privilege escalation bugs found in Linux package manager Snap
Newly discovered Snap flaw allows a low-privileged user to gain root access.
Serious PwnKit flaw in default Linux installations requires urgent patching
Attackers could gain root privileges by compromising any regular user account. Workarounds are available, patches on their way.
SASE in the spotlight as businesses prioritize edge network security
A new report discovers edge network definitions are in flux across industries as organizations look to augment traditional security controls to address edge network risks.
Machine as insider threat: Lessons from Kyoto University’s backup data deletion
Kyoto University lost terabytes of data in a machine-as-an-insider scenario triggered by human error. Here are questions CISOs should ask to avoid a similar situation.
BusyBox flaws highlight need for consistent IoT updates
Some of the 14 vulnerabilities could result in remote code execution or denial of service attacks.
Securing the edge: 4 trends to watch
The global COVID-19 pandemic exacerbated some of the security risks associated with the move to a more distributed computing model. Here are 4 ways security organizations are responding as edge computing threats evolve.
Ransomware recovery: 8 steps to successfully restore from backup
The best way to recover from a ransomware attack is to have a reliable and fast backup process. Here's how to do it.
PrintNightmare vulnerability explained: Exploits, patches, and workarounds
Public exploits are available for a remote code execution vulnerability in the Windows Print Spooler that could allow attackers to take full control of systems. The vulnerability affects all editions of Windows and organizations are...
Tabletop exercises: Six sample scenarios
Tabletop exercises are a low-stress, high-impact way to test your plans for handling a crisis. Here are some tips for getting the most out of the process, plus six scenarios you can use to start your journey.
SASE is coming, but adoption will be slow (especially for large enterprises)
Smaller organizations eye SASE to provide secure access to applications. Lack of maturity, existing security and digital transformation investments give large enterprises pause on SASE.
Business continuity and disaster recovery planning: The basics
Good business continuity plans will keep your company up and running through interruptions of any kind: power failures, IT system crashes, natural disasters, pandemics and more.
7 critical IT policies you should have in place
Putting a framework of IT policies that should be the foundation of every company's security plan.