Organizations across the globe are contemplating how to protect their environments from physical and cyber threats as traditional security programs are not sufficient. Andrew Wild of QTS Data Centers explores how converged security programs can provide a comprehensive and unified view of the security landscape.
With the rise of edge data centers and the increase in cloud-based computing expanding the potential attack surface, companies are now facing more challenges with things like misconfigurations, vulnerabilities, and gaps within their end-to-end cybersecurity. Andrew Nix of Schneider Electric explores how a well-kept cybersecurity plan can keep cybercriminals at bay.
The current conflict in Eastern Europe raises new cybersecurity concerns on a global level. Mark Houpt of DataBank describes describes the state of affairs from a cybersecurity perspective and highlights best practices data center operators should implement to minimize their risk.
T5 Data Centers plans to build a 140-acre, 200 megawatt campus in Georgia, adjacent to Fort Gordon and the U.S. Army’s Cyber Command Headquarters. The new campus taps into a cluster of advanced cybersecurity initiatives based in Augusta,
New workforce strategies that allow remote work have rendered traditional perimeter-based cybersecurity obsolete. Will Bass, Vice President of Cybersecurity Services for Flexential, discusses how organizations can transform their cybersecurity strategy to include long-term remote workforces.
With the COVID-19 pandemic, securing IT networks is more challenging and more essential than ever, as social distancing lockdowns add to an explosion of end users and connected devices.
Nelson Fonseca has been named Chief Executive Officer for Cyxtera Technologies, with Cyxtera founder and CEO Manuel Medina becoming Executive Chairman for both Cyxtera and AppGate, the recently-announced spin-out of Cyxtera’s security businesses.
Databank’s Mark Houpt explores the benefits of working with a specialized data center cloud provider, including performance, security options, and support for compliance.
The detect-and-respond security model requires organizations to build capabilities from the lowest levels and deploy solutions that can distribute the detection, obfuscation and isolation throughout their networks. This approach applies to sensors and IoT devices, controllers in connected equipment, and at all gateway and bridge points to expand the ability to monitor their equipment and network in real-time.
The most-read stories on Data Center Frontier last month focused on news from Google, LinkedIn and Intel. Stay informed and check out the Frontier Spotlight April 2018, featuring the most-read stories on Data Center Frontier.