Issue OverviewInformation Security magazine - November 2013 Vol. 15 / No. 9
Virtualization and cloud computing are part and parcel of enterprise networks today. Virtualization security, however, is still a bolt-on affair rather than a service layer that is well integrated into infrastructures or tied to workloads directly. In this month's cover story, author Chris Hoff looks at where we are today and the impact of cloud computing and software defined networking on virtualization security strategies.
We also look at black hat budgeting this month. CISOs are quickly realizing that they will not always be able to keep the attackers out of their enterprise networks. Instead, defense-in-depth strategies aim to raise the cost to the attackers -- in terms of time and money -- to compromise important systems and data. And we explore the "View from the Top," the results of the (ISC)2 CXO Report, which point to a software security paradox, among other findings. Access >>>
Premium Content for Free.
Virtualization security dynamics get old
by Chris Hoff
Companies have embraced virtualization and cloud computing, but security is still bolted-on. Here's what needs to change.
Eliminating black hat bargains
by Robert Lemos
Enterprises cannot always keep attackers out of their networks. Instead, defense-in-depth strategies aim to raise the cost to black hats -- in terms of time and money.
- Virtualization security dynamics get old by Chris Hoff
Beyond the Page, Nov. 2013: Virtual security
by Christofer Hoff
In the November 2013 Beyond the Page on virtual security, Chris Hoff examines the challenges infosec pros face in finding the right security strategy for their enterprise network.
Executive viewpoint: Mixed messages on software security
by Robert Richardson, Editorial Director
Software security ranks high among security executives' concerns but low in terms of time spent, according to an (ISC)2 CXO study.
- Beyond the Page, Nov. 2013: Virtual security by Christofer Hoff
Time for a closer look at software security
by Kathleen Richards, features editor
If software security keeps you up at night -- and it should -- you are in good company.
New measures for security metrics: Ranum Q&A with Jay Jacobs
by Marcus Ranum
Wading into the murky waters of security metrics? Jay Jacobs offers his take on data collection and incident reporting with the VERIS framework.
Break-even analysis: The highs and lows of risk and ROSI
by Pete Lindstrom, Contributor
What's a dollar spent on security worth in terms of risk? Break-even analysis helps you decide.
- Time for a closer look at software security by Kathleen Richards, features editor
More Premium Content Accessible For Free
Secure file transfer: Send large files fast, but keep your system safe
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...
Is your mobile security strategy combating the wrong enemy?
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
What's the best focus for MDM strategy now?
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...