8 ways enterprises can enhance object storage security
Data stored as objects can take many different forms and sizes, such as analytical data and video files, and volumes can run high — think petabytes. As a result, object storage security is essential to protect data from hackers, ransomware, and other cyberattacks and risks. The eight best practices for object storage security here include […]
Read MoreCEO: GenAI changes multi-cloud security, network equation
Generative AI presents enterprises with higher cloud costs than traditional workloads, complicating multi-cloud security and networking, according to one industry CEO. Data gravity and the cost of GPU-based computing infrastructure that’s required for generative AI (GenAI) mean many enterprises are choosing to move AI apps to various locations, including back on-premises, according to Doug Merritt, […]
Read MoreMost widely exploited vulnerabilities in 2023 were zero days
Attackers exploited significantly more zero-day vulnerabilities against victim organizations in 2023 compared to 2022, according to a new government advisory. CISA published a joint government advisory Tuesday that detailed the topmost exploited vulnerabilities of 2023. The advisory, co-authored by agencies in the U.K., Australia, Canada and New Zealand, warned of alarming trends that further underscored […]
Read MoreAn explanation of ethical hackers
In this video, TechTarget editor Jennifer English talks about ethical hackers, how they differ from typical hackers and how they can aid in protecting an organization’s data. Although the term hacker usually comes with a negative connotation, there are good hackers too. An ethical hacker is an infosec specialist who breaks into a computer system, […]
Read MoreMicrosoft halts 2 zero-days on November Patch Tuesday
For November Patch Tuesday, Microsoft admins must address two Windows zero-days quickly, but enterprises that use on-premises Exchange Server should prioritize patching that platform to resolve a spoofing vulnerability. This Patch Tuesday, Microsoft released fixes for 88 new vulnerabilities with four rated critical. Of the two zero-days, one was also publicly disclosed. In total, Microsoft […]
Read MoreAnyone Can Buy Data Tracking US Soldiers and Spies to Nuclear Vaults and Brothels in Germany
Nearly every weekday morning, a device leaves a two-story home near Wiesbaden, Germany, and makes a 15-minute commute along a major autobahn. By around 7 am, it arrives at Lucius D. Clay Kaserne—the US Army’s European headquarters and a key hub for US intelligence operations. The device stops near a restaurant before heading to an […]
Read MoreImmigration Police Can Already Sidestep US Sanctuary City Laws Using Data-Sharing Fusion Centers
On the campaign trail and in recent days, Donald Trump has detailed extensive plans for immigration crackdowns and mass deportations during his second term as United States president. These initiatives would, he has said, include aggressive operations in areas known as “sanctuary cities” that have laws specifically curtailing local law enforcement collaboration with US Immigration […]
Read MoreBitfinex Hacker Gets 5 Years for $10 Billion Bitcoin Heist
In perhaps the most adorable hacker story of the year, a trio of technologists in India found an innovative way to circumvent Apple’s location restrictions on AirPod Pro 2s so they could enable the earbuds’ hearing aid feature for their grandmas. The hack involved a homemade Faraday cage, a microwave, and a lot of trial […]
Read MoreMore Spyware, Fewer Rules: What Trump’s Return Means for US Cybersecurity
For American companies grousing about new cybersecurity rules, spyware firms eager to expand their global business, and hackers trying to break AI systems, Donald Trump’s second term as president will be a breath of fresh air. For nearly four years, president Joe Biden’s administration has tried to make powerful US tech firms and infrastructure operators […]
Read More