Fueled by Innovation, Sustainability Moves Back to the Forefront

Fueled by Innovation, Sustainability Moves Back to the Forefront

As the global pandemic gradually winds down, carbon emissions are again on the increase and sustainability is moving back to the forefront as a global concern. While data centers have played a pivotal role providing the digital infrastructure for the emerging global economy, digital transformation continues to increase the power required for today’s modern data center.  A Valuates Report projects the global data center market for power increasing from $15 billion in 2020 to $21.5…

Read More

Cybersecurity Sharing: Answering the Executive Order with Cyber Resilience

Cybersecurity Sharing: Answering the Executive Order with Cyber Resilience

Co-written with Jason Burosh As noted previously, President Biden recently signed an Executive Order to improve America’s cybersecurity in the wake of major cyberattacks, such as SolarWinds. Although this Executive Order only applies to the federal government and federal government systems. It can also be applied to thousands of government contractors that provide IT goods and services to the US government. The first two sections highlight the need to prioritize detection and response capabilities while…

Read More

5 factors for success in cybersecurity projects among shifting priorities

5 factors for success in cybersecurity projects among shifting priorities

As more companies are considering the shift to a fully or hybrid remote workforce, accelerating plans to acquire digital and cloud services to address increasing cybersecurity risks is necessary. Image: Rick_Jo, Getty Images/iStockphoto Cybersecurity and regulatory compliance have become two of the biggest concerns of corporate boards. When it comes to the impact of the COVID-19 pandemic and the new realities of employees working from home, many businesses have been forced to reassess many of…

Read More

Hyperautomation and Cybersecurity – A Platform Approach to Telemetry Architectures | McAfee Blogs

Hyperautomation and Cybersecurity – A Platform Approach to Telemetry Architectures | McAfee Blogs

Hyperautomation is a process where artificial intelligence (AI), machine learning (ML), event-driven software, and other tools are used to automate as many business and IT processes as possible.  Forecasted by Gartner to reach $596.6 billion by 20221, hyperautomation and the global software market that enables it show no signs of slowing. The myriad of technologies used by a typical organization often are not integrated and exist as siloed disparate tools.  Hyperautomation aims to reduce this…

Read More

Data as a Strategic Asset – Securing the New Perimeter in the Public Sector | McAfee Blogs

Data as a Strategic Asset – Securing the New Perimeter in the Public Sector | McAfee Blogs

Every organization has data moving to the multi-cloud; digital transformation is occurring rapidly, is here to stay, and is impacting every major industry.  Organizations are working hard to adopt Zero Trust architectures as their critical information, trade secrets, and business applications are no longer stored in a single datacenter or location. As a result, there is a rapid shift to cloud resources to support dynamic mission requirements, and the new perimeter to defend is data. …

Read More

Reshaping the future of transportation with the ITS World Congress

Reshaping the future of transportation with the ITS World Congress

The pandemic, lockdowns and economic fallout threw into stark relief the inadequacies of systems and processes worldwide. As more and more organizations look to digital tech to transform their operations, the global ITS community is also seizing the moment: capitalizing on projects underway and bringing new ideas and innovations into the spotlight. At the ITS World Congress in Hamburg this October, the real-life developments and solutions will be showcased. “This will be one of Europe’s…

Read More

Threat actors leaked data stolen from EA, including FIFA code

Threat actors leaked data stolen from EA, including FIFA code

Threat actors that hacked Electronic Arts in June have leaked full data dump stolen from the company after the failure of the negotiation with the victim. In June, hackers have compromised the network of the gaming giant Electronic Arts (EA) and claimed to have stolen approximately 780 GB of data. The stolen data include the source code of the games, the source code of the FrostBite game engine and debug tools, FIFA 21 matchmaking server code, proprietary EA games…

Read More

Back-to-Basics: Keep Software Patched

Back-to-Basics: Keep Software Patched

  As small and medium businesses begin to re-open following the pandemic, it’s important to do so securely in order to protect customer’s payment card data. Too often, data breaches happen as a result of vulnerabilities that are entirely preventable. The PCI Security Standards Council (PCI SSC) has developed a set of payment protection resources for small businesses. In this 8-part back-to-basics series, we highlight payment security basics for protecting against payment data theft. Today’s…

Read More

3 Tips to Protect Yourself From XLoader Malware

3 Tips to Protect Yourself From XLoader Malware

Picture this: you open your MacBook and see an email claiming to be from your favorite online store. In the email, there is an attachment with “important information regarding your recent purchase.” Out of curiosity, you open the attachment without checking the recipient’s email address. The next thing you know, your device is riddled with malware.   Unfortunately, this story is not far from reality. Contrary to popular belief, Apple computers can get viruses, and XLoader has Mac users in their sights.  …

Read More
1 3,262 3,263 3,264 3,265 3,266 3,630