Data Center

Data Center | News, how-tos, features, reviews, and videos

ransomware attack
Data center corridor of servers with abstract overlay of digital connections.

Data center corridor of servers with abstract overlay of digital connections.

Cyberattacks hit data centers to steal information from global companies

A malicious campaign against data centers stole the access credentials of some of the world's biggest companies — including Amazon, Apple, Goldman Sachs, and Microsoft — according to reports.

12 ransomware

VMware ESXi server ransomware evolves, after recovery script released

The FBI and CISA have released a recovery script for the global ESXiArgs ransomware campaign targeting VMware ESXi servers, but the ransomware has since been updated to elude former attempts at remediation.

recovery gauge [disaster recovery - crisis survival - business continuity]

CYGNVS exits stealth, trumpeting its cyberattack recovery platform

CYGNVS platform promises a playbook, out-of-band connectivity, and more to help organizations recovery from major cyberattacks.

170227 mwc 02756

Intel boosts VM security, guards against stack attacks in new Xeon release

Intel’s TDX framework gains a new capability, and a “shadow stack” in Xeon’s fourth generation aims to knock out a dangerous cyberattack method.

log logs computer monitor screen cursor menu pc menu

How to enable event collection in Windows Server

SIEM and SOAR allow enterprises to collect and correlate log event data but may not be the ideal choice for every organization. Microsoft’s Windows Event Forwarding aggregates system event logs from disparate systems.

networking abstract

Nvidia partners with Dell and VMware for faster AI systems

New vSphere paired with Nvidia DPUs will speed up data center performance.

Conceptual rescue / recovery image   >   A flotation device drifts on a binary sea.

Best practices for recovering a Microsoft network after an incident

Follow this advice to minimize stress when recovering credentials, systems and settings after a ransomware or other cyberattack.

Ransomware

Kyndryl launches recovery retainer service for cyberattack response

Expert preparedness review and on-demand recovery assistance are featured in Kyndryl’s latest offering.

virtual network security picture id1208405529

Cato Networks launches SSE system with customizable DLP capabilities

Cato SSE 360 provides a security service edge offering that includes DLP (data loss prevention) features based on customizable rules.

2 linux malware scarier

Hackers using stealthy Linux backdoor Symbiote to steal credentials

Symbiote is deployed as a shared object that can inject itself into existing processes, making it difficult to detect.

Cybersecurity

RSA: Intel reference design to accelerate SASE, other security tasks

Intel says its reference design will enable accelerator cards to offload security processing from server CPUs without requiring more rack space.

2 linux malware scarier

Linux malware is on the rise—6 types of attacks to look for

Malware targeting Linux environments has increased massively in the past year, with threat actors using a variety of techniques to carry out operations.

20151027 red hat logo

Red Hat debuts edge features for Linux, Kubernetes platform security

At its annual Summit event, Red Hat is rolling out new edge-computing features for the company’s well-known enterprise Linux distribution, and security features for its Advanced Cluster Security for Kubernetes platform.

hybrid cloud

Dell offers data, app recovery support for multicloud assets

Dell is adding data recovery solutions to its APEX portfolio, for data centers and public clouds including Azure and AWS.

emergency disaster recovery business continuity binary by mjfelt getty images 538726573

Kyndryl rolls out Dell partnership for disaster recovery and security

New offering aims to synchronize disaster recovery and business continuity with cybersecurity.

data pipeline primary

Dirty Pipe root Linux vulnerability can also impact containers

Researchers have shown that the Dirty Pipe vulnerability can be used to modify protected files and gain root rights.

CSO > cloud computing / backups / data center / server racks / data transfer

Redstor extends protection of Kubernetes in AWS, unifies container backups

New support for Amazon EKS enables partners to scale back ups rapidly without complex scripting and removes need to bolt together multiple solutions.

Linux security shield

Dangerous privilege escalation bugs found in Linux package manager Snap

Newly discovered Snap flaw allows a low-privileged user to gain root access.

Load More
You Might Also Like