Issue OverviewInformation Security magazine - November 2013 Vol. 15 / No. 9
Virtualization and cloud computing are part and parcel of enterprise networks today. Virtualization security, however, is still a bolt-on affair rather than a service layer that is well integrated into infrastructures or tied to workloads directly. In this month's cover story, author Chris Hoff looks at where we are today and the impact of cloud computing and software defined networking on virtualization security strategies.
We also look at black hat budgeting this month. CISOs are quickly realizing that they will not always be able to keep the attackers out of their enterprise networks. Instead, defense-in-depth strategies aim to raise the cost to the attackers -- in terms of time and money -- to compromise important systems and data. And we explore the "View from the Top," the results of the (ISC)2 CXO Report, which point to a software security paradox, among other findings. Access >>>
Premium Content for Free.
Virtualization security dynamics get old
by Chris Hoff
Companies have embraced virtualization and cloud computing, but security is still bolted-on. Here's what needs to change.
Eliminating black hat bargains
by Robert Lemos
Enterprises cannot always keep attackers out of their networks. Instead, defense-in-depth strategies aim to raise the cost to black hats -- in terms of time and money.
- Virtualization security dynamics get old by Chris Hoff
Beyond the Page, Nov. 2013: Virtual security
by Christofer Hoff
In the November 2013 Beyond the Page on virtual security, Chris Hoff examines the challenges infosec pros face in finding the right security strategy for their enterprise network.
Executive viewpoint: Mixed messages on software security
by Robert Richardson, Editorial Director
Software security ranks high among security executives' concerns but low in terms of time spent, according to an (ISC)2 CXO study.
- Beyond the Page, Nov. 2013: Virtual security by Christofer Hoff
Time for a closer look at software security
by Kathleen Richards, features editor
If software security keeps you up at night -- and it should -- you are in good company.
New measures for security metrics: Ranum Q&A with Jay Jacobs
by Marcus Ranum
Wading into the murky waters of security metrics? Jay Jacobs offers his take on data collection and incident reporting with the VERIS framework.
Break-even analysis: The highs and lows of risk and ROSI
by Pete Lindstrom, Contributor
What's a dollar spent on security worth in terms of risk? Break-even analysis helps you decide.
- Time for a closer look at software security by Kathleen Richards, features editor
More Premium Content Accessible For Free
2013 Security 7 award winners revealed
In this special issue, we are revealing the winners of our Security 7 awards. This is the ninth year we've handed out the Security 7 awards, which ...
Next-generation authentication technologies emerge to restore balance
Cloud and mobility in the enterprise has caused a heightened need for organizations to take a closer look at next generation authentication ...
Insider edition: Layering mobile security for greater control
Mobile device security is one of the biggest nightmares InfoSec pros face in the era of bring your own everything (BYOE). Simply banning employees ...