Virtualization News, Articles and Updates
Cisco has acquired Milpitas, Calif.-based Virtuata, a security software start-up that safeguards virtual machine data, for an undisclosed sum.
While cost reductions are a leading factor in the migration to cloud environments, security in virtualized implementations is still a concern.
VMware addressed flaws that enable attackers to carry out malicious activity.
With emerging technologies that must be controlled, the demand to align business risk with security is growing. As such, the IT role is being reinvented under our feet, and those who function more like a CIO will rule the world.
As more organizations move into the cloud, the demand for virtualization security architects is growing.
The continued growth of virtualization, cloud infrastructures and mobile computing will drive the demand for IT security talent in 2012.
Hackers and computer criminals have shown an ongoing ability to stay one step ahead of the security professional, but there are strategies and tools to help thwart their efforts.
The virtual environment is very different from the "physical" data center where networks, servers and applications can be easily secured and monitored.
Virtualization has been with us in one form or another for a long time, but now that it is a staple of the systems world, it really has come into its own.
SC Magazine Editor-in-Chief Illena Armstrong sits down with Tom Reilly, VP and general manager, HP Enterprise Security Products, to discuss how corporations' increased reliance on virtualization, applications and mobile devices create new surface areas for attack, and what CSOs must do to make the business case for information security and risk management funding.
Before seeking out help from vendors in dealing with the advanced persistent threat, security professionals must understand exactly what defines such an attack.
Jason Cornish, 37, of Smyrna, Ga., faces up to 10 years in prison and a $250,000 fine for breaking into the computer network of the U.S.-based subsidiary of a Japanese pharmaceutical company
The PCI Security Standards Council on Tuesday released "PCI DSS Virtualization Guidelines" to update credit card payment security to the age of cloud computing.
Virtualization provider VMware has acquired Shavlik Technologies, a provider of cloud-based IT management solutions for small and midsize businesses (SMBs), the companies announced Monday. The deal, the terms of which were not disclosed, is expected to close later this quarter. Following the acquisition, VMware will offer SMBs a full portfolio for managing, monitoring and securing IT environments, the company said. The two vendors already partner to provide VMware GO, a free, web-based service that assists SMBs in the deployment and management of VMware technology.
As virtualization becomes more mainstream, even in small and midsize organizations, security professionals must consider the risks of managing this emerging technology. Threats such as VM sprawl, in which IT departments lose visibility of their virtual assets, creates the potential of unpatched and vulnerable machines. Rob Juncker, VP of technology at Shavlik, sits down with SC Magazine Executive Editor Dan Kaplan to explain why organizations must apply the same security principles to their virtual machines as they do for their traditional computing systems.
SPONSORED VIDEO: Dave Asprey chats with SC Magazine Executive Editor Dan Kaplan on the RSA Conference showroom floor in San Francisco. Asprey explains that as cloud and virtualization technology gain traction with senior-level executives, enterprises are taking the time to build security into these projects. He also talks about the benefits of encryption in the cloud and how virtual machine density can be increased simply by running proper security products.
Virtualization is a silver lining in the cloud, said EMC/RSA's Art Coviello, in the opening keynote at the 2011 RSA Conference in San Francisco.
The National Institute of Standards and Technology this week issued a guidance document for securely configuring and using virtualization technologies.
Monitoring those with access to virtual machines running in the cloud is an important step to successful deployment.
This year, thanks to a renewed focus on the insider threat, the longings of the security professional may come to fruition.
Trusting one's cloud provider remains a major deterrent to adoption, but there are ways to confirm that a third-party vendor is operating in good faith.
The group responsible for managing payment security rules plans to release two new guidance documents early next month assessing the impact of emerging data security technologies on payment card security.
IBM X-Force's mid-year threat report examined trends in vulnerability disclosures, techniques used to foist malware and risks to virtual environments, plus much more.
Many organizations may be considering server virtualization, but next on the horizon is desktop virtualization, which promises to deliver secure remote access and WAN optimization, among other benefits.
Adoption of virtualization is continuing - with caveats, says Guy Buzzelli, CIO of Delray Beach, Fla. Dan Kaplan reports.
Virtualization is quickly transforming the IT landscape, but some organizations may have overlooked the security ramifications it presents.
Researchers say Microsoft's virtualization software suffers from a zero-day vulnerability, but the Redmond, Wash. software giant disagrees.
In five years, virtualized systems likely will be more secure than their physical counterparts, but until then, it will be rough sledding for organizations transitioning to the new technology, according to a new report from Gartner.
More than traditional crime, natural disasters and terrorism, the security threat that enterprise IT departments are most concerned with is cybercrime, according to a study by Symantec.
SC Magazine Articles
- Blasphemy! Godless malware preys on nearly 90 percent of Android devices
- 'Password attacks' continue; Citrix becomes latest victim
- Guccifer 2.0 out - Cozy Bear, Fancy Bear hacked DNC, Fidelis analysis shows
- Acer breach caused by improperly stored data
- Check Point tracks two waves of Cerber ransomware hitting U.S., UK
- CEO sacked after aircraft company grounded by whaling attack
- Microsoft warns of new, self-propagating ransomware in the wild
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components