filters
Date
  • Date
all topics
  • Mechanical & Electrical
    • Cooling Systems
    • Power Systems
  • IT Systems & Networks
    • IT Systems
    • Networks & Connectivity
    • Cloud Computing
  • Sustainability
    • Energy Efficiency
    • Reporting & Regulations
    • eWaste
    • Water
    • Low-Carbon Power
  • Resiliency, Risk & Security
    • Availability
    • Risk Management
    • Fire & Life Safety
    • Physical Security
    • Cyber Security
  • Data Center Management
    • DCIM
    • Building & Controls
    • AI & Automation
    • Procedures & Documentation
  • Staff, Skills & Training
    • Training & Professional Development
    • Staffing & Hiring
  • Strategy & Planning
    • Benchmarks & Industry Trends
    • Standards & Metrics
    • Economics
  • Design, Siting, Construction
    • Building Features & Design
    • Site Selection
    • Modernization & Consolidation
    • Prefab & Modular Data Centers
  • Data Center Types & Venues
    • Colocation
    • Enterprise
    • Hyperscale
    • Edge
    • Venue Selection
  • Innovation & Disruption
all types
  • Intelligence
  • Keynote Reports
  • Briefing Reports
  • Data Reports
  • Data Assets
  • Intelligence Updates
  • Intelligence Resources
  • Events
  • Event Recaps
  • On-Demand Webinars
  • Upcoming Events
  • Discussions
Selected Filters
Unlocked content only
2 Jan 2025
Are data centers on top of NIS 2 cyber compliance?

The EU’s NIS 2 directive requires all organizations operating in Europe to comply with 10 essential cybersecurity measures, but many data center operators remain unprepared.

4 Dec 2024
Addressing supply chain risk in data center cybersecurity

Cyber strategies need to extend beyond the facility to reduce third-party supplier threat risks. Data center executives should apply robust, consistent supply chain risk management practices to critical data center technologies

Briefing Reports 10 min read
 
Cyber incidents are common — and often significant

Results from the Uptime Institute Security Survey 2024 highlight the different cybersecurity approaches used by operators against a widening range of threats.

Using frameworks to structure data center cybersecurity

Cybersecurity strategies often evolve organically: tools are added, requirements change, and the result is a lack of coherent structure. Cybersecurity professionals can benefit from adopting frameworks to organize these activities

Briefing Reports 9 min read
 
Developing data center cybersecurity policies and procedures

Policies and procedures translate cybersecurity management objectives into the activities that protect data centers. But what steps should operators take to establish a comprehensive approach to implement these policies?

Briefing Reports 11 min read
 
Risk management in data center cybersecurity

Data center cybersecurity risks need to be managed in line with corporate objectives and across a wide range of cyber adversaries and threats. This means understanding the organizational risk tolerance and being able to identify the best options for

Briefing Reports 9 min read
 
Roles and responsibilities in data center cybersecurity governance

Data center cyber governance requires all key tasks to be identified, and that specific individuals are accountable for each task. Effective cybersecurity governance defines how key assets are protected and the roles that hold responsibility.

Briefing Reports 10 min read
 
Effective data center governance for cybersecurity

Good data center governance provides a foundation for effective data center cybersecurity. How should data center leaders structure an approach that optimizes the resources needed to safeguard data centers?

Briefing Reports 7 min read
 
Operators boost cybersecurity efforts, but more work is needed

Only half of data center operators rate their cyber resiliency assessments as effective, despite three in four operators experiencing a recent cyber incident.

Identifying and addressing data center cybersecurity threats

Identifying the extent of security requirements is a critical first step in building a viable data center cybersecurity strategy. Data center managers should identify and answer essential questions to implement an effective playbook.

18 Jun 2024
Mitigating OT risk from third-party requests

Operators often resist giving third parties access to OT data to limit vulnerabilities. Nevertheless, some colocation customers require this access — as will emerging AI tools — but the OT air-gap should not be bridged lightly.

 
3 Jun 2024
Complexity versus cybersecurity in the data center: which wins?

Data center managers are squeezed between complexity arising from digital innovation and the need for secure and reliable service delivery. Is it possible to minimize risk while enabling business innovation?

 
Scoping data center cybersecurity

Identifying the extent of security requirements is a critical first step in building a viable data center cybersecurity strategy. Data center managers should identify and answer essential questions to implement an effective playbook.

Briefing Reports 10 min read
 
16 Apr 2024
The threat to data center security from state-sponsored hackers

Most cyberattacks are sudden and target financial gain. Attacks on data centers and critical infrastructure can be very different. State-sponsored hackers use varied and sophisticated tactics in support of geopolitical goals.

 
10 Apr 2024
OT protection: is air-gapping the answer?

Cyberattacks on operational technology (OT) systems are rising, and OT failure could be catastrophic for data centers. Managers need to understand the nature of the threat and the defense options to protect their critical environments.

Posting discussions is not available for Network Guests