Designing for safety: 10 cybersecurity priorities for a zero-trust data center

0
272

Head over to our on-demand library to view sessions from VB Transform 2023. Register Here


This article is part of a VB special issue. Read the full series here: The future of the data center: Handling greater and greater demands.

Zero trust is the virtual shield data centers need to harden against increasingly complex, well-orchestrated data center attacks. Attackers are gaining access to data centers using stolen privileged access credentials and IDs, looking to exfiltrate as much customer data as possible. 

Just to name two examples, attackers successfully obtained emails, passwords and other customer data from Shanghai-based GDS Holdings Ltd. and Singapore-based ST Telemedia Global Data Centres, two of Asia’s largest data center operators.

Resecurity Inc. recently provided an in-depth analysis of attackers’ strategies to infiltrate data centers, cloud service providers and managed service providers. Resecurity found that the most vulnerable threat vectors for data centers include customer support, customer service, and ticket management support portals running on data center servers. Attackers can gain enough control to steal thousands of…

Read More…

Актуальные книги на английском