Virtualization

Cisco buys Virtuata for virtual security

By

Cisco has acquired Milpitas, Calif.-based Virtuata, a security software start-up that safeguards virtual machine data, for an undisclosed sum.

Virtualization

Virtualization

While cost reductions are a leading factor in the migration to cloud environments, security in virtualized implementations is still a concern.

VMware releases patches for bugs found in its products

By

VMware addressed flaws that enable attackers to carry out malicious activity.

The IT staff of the future will speak business, not just technology

The IT staff of the future will speak business, not just technology

With emerging technologies that must be controlled, the demand to align business risk with security is growing. As such, the IT role is being reinvented under our feet, and those who function more like a CIO will rule the world.

Skills in demand: Virtualization security

Skills in demand: Virtualization security

As more organizations move into the cloud, the demand for virtualization security architects is growing.

Forecast: Information security positions in high demand

The continued growth of virtualization, cloud infrastructures and mobile computing will drive the demand for IT security talent in 2012.

A closer look at two of today's top security threats

Hackers and computer criminals have shown an ongoing ability to stay one step ahead of the security professional, but there are strategies and tools to help thwart their efforts.

Best practices for securing your virtualized data center

The virtual environment is very different from the "physical" data center where networks, servers and applications can be easily secured and monitored.

Virtualization

By

Virtualization has been with us in one form or another for a long time, but now that it is a staple of the systems world, it really has come into its own.

Sponsored video: Tom Reilly of HP on security investment

By

SC Magazine Editor-in-Chief Illena Armstrong sits down with Tom Reilly, VP and general manager, HP Enterprise Security Products, to discuss how corporations' increased reliance on virtualization, applications and mobile devices create new surface areas for attack, and what CSOs must do to make the business case for information security and risk management funding.

Advanced persistent threats call for a reality check

Advanced persistent threats call for a reality check

Before seeking out help from vendors in dealing with the advanced persistent threat, security professionals must understand exactly what defines such an attack.

IT worker pleads guilty to crippling ex-employer's network

By

Jason Cornish, 37, of Smyrna, Ga., faces up to 10 years in prison and a $250,000 fine for breaking into the computer network of the U.S.-based subsidiary of a Japanese pharmaceutical company

Virtualization guidelines issued to supplement PCI DSS 2.0

By

The PCI Security Standards Council on Tuesday released "PCI DSS Virtualization Guidelines" to update credit card payment security to the age of cloud computing.

VMware to acquire Shavlik to boost SMB offerings

By

Virtualization provider VMware has acquired Shavlik Technologies, a provider of cloud-based IT management solutions for small and midsize businesses (SMBs), the companies announced Monday. The deal, the terms of which were not disclosed, is expected to close later this quarter. Following the acquisition, VMware will offer SMBs a full portfolio for managing, monitoring and securing IT environments, the company said. The two vendors already partner to provide VMware GO, a free, web-based service that assists SMBs in the deployment and management of VMware technology.

Managing virtualization: Interview with Rob Juncker, VP of technology, Shavlik

By

As virtualization becomes more mainstream, even in small and midsize organizations, security professionals must consider the risks of managing this emerging technology. Threats such as VM sprawl, in which IT departments lose visibility of their virtual assets, creates the potential of unpatched and vulnerable machines. Rob Juncker, VP of technology at Shavlik, sits down with SC Magazine Executive Editor Dan Kaplan to explain why organizations must apply the same security principles to their virtual machines as they do for their traditional computing systems.

Encryption and advancing cloud security

SPONSORED VIDEO: Dave Asprey chats with SC Magazine Executive Editor Dan Kaplan on the RSA Conference showroom floor in San Francisco. Asprey explains that as cloud and virtualization technology gain traction with senior-level executives, enterprises are taking the time to build security into these projects. He also talks about the benefits of encryption in the cloud and how virtual machine density can be increased simply by running proper security products.

RSA Conference 2011: Trust in the cloud is achievable today

By

Virtualization is a silver lining in the cloud, said EMC/RSA's Art Coviello, in the opening keynote at the 2011 RSA Conference in San Francisco.

NIST issues virtualization security guidance

By

The National Institute of Standards and Technology this week issued a guidance document for securely configuring and using virtualization technologies.

Cloud computing brings a chance of showers

Cloud computing brings a chance of showers

Monitoring those with access to virtual machines running in the cloud is an important step to successful deployment.

2011: A security manager's wish list

2011: A security manager's wish list

This year, thanks to a renewed focus on the insider threat, the longings of the security professional may come to fruition.

Achieving integrity in the cloud

Achieving integrity in the cloud

Trusting one's cloud provider remains a major deterrent to adoption, but there are ways to confirm that a third-party vendor is operating in good faith.

PCI Council: P2PE simplifies PCI DSS compliance

By

The group responsible for managing payment security rules plans to release two new guidance documents early next month assessing the impact of emerging data security technologies on payment card security.

IBM report shows new flaws skyrocket in first half of year

By

IBM X-Force's mid-year threat report examined trends in vulnerability disclosures, techniques used to foist malware and risks to virtual environments, plus much more.

Implications of desktop virtualization for secure remote access

Implications of desktop virtualization for secure remote access

Many organizations may be considering server virtualization, but next on the horizon is desktop virtualization, which promises to deliver secure remote access and WAN optimization, among other benefits.

Virtual reality: Adoption of virtualization

Virtual reality: Adoption of virtualization

By

Adoption of virtualization is continuing - with caveats, says Guy Buzzelli, CIO of Delray Beach, Fla. Dan Kaplan reports.

Avenging host: The impact of virtualization on network security

Avenging host: The impact of virtualization on network security

Virtualization is quickly transforming the IT landscape, but some organizations may have overlooked the security ramifications it presents.

Security firm finds bug in Microsoft virtual program

By

Researchers say Microsoft's virtualization software suffers from a zero-day vulnerability, but the Redmond, Wash. software giant disagrees.

Gartner: Virtualization security will take time

By

In five years, virtualized systems likely will be more secure than their physical counterparts, but until then, it will be rough sledding for organizations transitioning to the new technology, according to a new report from Gartner.

Study finds cyberthreats to be largest security concern

By

More than traditional crime, natural disasters and terrorism, the security threat that enterprise IT departments are most concerned with is cybercrime, according to a study by Symantec.

Sign up to our newsletters

POLL