SC Magazine 20/20: Security impacts of virtualization

Share this article:
SC Magazine 20/20: Security impacts of virtualization
SC Magazine 20/20: Security impacts of virtualization

SC Magazine is pleased to introduce SC Magazine 20/20, a unique webcast series associated with its 20th Anniversary issue. The free webcast series features a member of the SC Magazine editorial team sitting down with various industry thought leaders to discuss the past, present and future of IT security. Our next webcast in the series:

Security impacts of virtualization

Live Date: Thursday, Dec. 17, 2009
Time: 2:00 p.m. ET/11:00 a.m. PT

Click here to view this webcast on demand.

There's no doubt that advances in information technology can impact how data is exchanged - and exposed. Alongside developments such as cloud computing and Web 2.0, the deployment of virtualized machines has increased steadily. However, as companies have looked to harness the power of the virtual infrastructures they've built out - realizing reductions in cost and physical complexity - many fail to appropriately protect them and the data they house. It's true that securing the underlying operating environment and the individual virtual machines is crucial to safeguarding critical data, but this can be difficult to accomplish and manage. Yet, many organizations now are relying on virtualization in some form or another, and dependence on this technology is set to rise in coming years. As we look at where we are now and what the future may hold, we find out just how cybercriminals are taking advantage of these unprotected environments and what practical steps companies can take to protect against these.

Featured speakers
Dan Kaplan,
senior reporter, SC Magazine
Raimund Genes, CTO anti-malware, Trend Micro

Sponsored by


Share this article:
You must be a registered member of SC Magazine to post a comment.
close

Next Article in Editorial Webcasts

Sign up to our newsletters

More in Editorial Webcasts

Leveraging big data governance

Managing the vast volumes of data -- both customer and corporate -- on which most organizations depend for their day-to-day operations and long-term growth of their businesses always has been challenging.

Protecting your core assets

Maintaining even the most basic IT security controls is becoming more challenging for organizations as cloud computing, mobile and bring-your-own-device (BYOD) reshape the average corporate network and how it is used.

Wanted: Buy-in from the board

As massive breaches occur with more frequency, consumers have become increasingly anxious about just how large retail, financial and other companies with which they're dealing are protecting their personal information.