Edge computing, where data is created, collected and acted on, brings vulnerabilities to security risks and sophisticated cyber criminals. Zero-trust architecture (ZTA), treating every entity as a new security perimeter, has been outlined to better protect this. Dell NativeEdge platform applies ZTA, providing seamless edge, core, and cloud deployment.

Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers
Cybersecurity researchers have revealed details about Outlaw, an “auto-propagating” cryptocurrency mining botnet that targets SSH servers with weak credentials. The Romanian-origin malware performs SSH brute-force