This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Not too long ago, an article on BitDefender caught my eye. Titled “California’s ban on weak default passwords isn’t going to fix IoT security,” it explained how default passwords are a problem with the Internet of Things (IoT), but they’re not the problem.
Security checks can sometimes leave your jaw dropped and your budget flying out the window. Data centers have a high concern and risk for security for obvious reasons, and are pretty big targets to evil doers.
The rise of edge computing is shifting data centers once again. Centralized data centers continue to ramp up, with many service provider construction projects focused on facilities.
Increasingly complex data centers have created an opportunity for smart technology, artificial intelligence (AI), and machine-learning technology to advance rapidly.
In part one of this series, I highlighted the first five of what I think are the top 10 underutilized or less understood data center security best practices.
Through the seemingly never-ending onslaught of security breaches making headlines day after day, we are learning that the most intrusive and harmful attacks are actually the ones related to low-level security holes.
As I briefly mentioned in my last guest column, one of the keys to a secure data center is understanding what “normal” looks like within your environment.
According to a SolarWinds survey earlier this year, while organizations may be more prepared today than in the past, the threat and consequences of cyber attack and security breaches loom as large as ever.