Email Alerts
-
Effectively navigating the security risk assessment process
This month’s Information Security magazine cover story focuses on active strategies for malware resistance and compliance, data protection and incident responses found in VDI approaches. Learn how you can implement three top strategies to ensure your... E-Zine
-
Best practices for securing virtual machines
This month’s Information Security magazine explores the need for sound security and risk management strategies around virtualization technology. You'll also get expert advice and learn about the latest best practices for securing virtual machines. We... E-Zine
-
Virtualization security strategies in action
Space savings and reductions in energy costs are causing more organizations to move, or at least consider the move, to virtual environments. Download this e-book and discover how to mitigate the inherent security risks associated with the adoption of... E-Book
-
Five crucial virtualization do's and don'ts
In this month's issue of Information Security magazine, learn five virtualization security do's and don'ts. Read about virtualization products, segmentation, and implementation, and patching virtual machines. We review Credant Mobile Guardian 6.0, Ar... E-Zine
-
Three hypervisor and virtual environment security concerns
Virtualization offers many benefits but also comes with plenty of risks. Keep these three things in mind when planning virtual environment security. Feature
-
Server virtualization security best practices guide
This virtual machine security guide outlines server virtualization security best practices and weighs the pros and cons of different virtual server security methods. Resource Guide
-
Guarding against virtualization security risks and vulnerabilities
You can limit virtualization security risks and vulnerabilities by understanding attack vectors. This section of our virtualization security guide helps you prevent attacks. Resource Guide
-
Virtual security: Developing a plan and procedures
This section of our virtual security guide covers how to design and execute a plan to protect your server virtualization infrastructure's sensitive information. Resource Guide
-
Hyper-V virtualization security guidelines and tips
Data centers can't depend solely on Microsoft for Hyper-V security. You can implement several configurations and procedures to secure Hyper-V virtualization. Resource Guide
-
VMware security: Protecting a VMware environment
There are several ways to improve VMware security to protect a VMware environment from hackers and exploits. In this section, we show you how. Resource Guide
-
VMware security best practices guide
Without the proper VMware security, your entire IT infrastructure could be at risk. VMware security best practices can keep your environment safe. Resource Guide
-
Quiz: Virtualization and compliance
How much have you gleaned from this Virtualization and compliance Security School lesson? Test you knowledge of cloud compliance best practices and the future of virtualization compliance. Quiz
-
Case Study: US supermarket chain solves security challenge virtually
A US supermarket chain has implemented an endpoint security system to secure legacy applications and to save additional development Case Study | 30 May 2013
-
Inaugural AWS re:Invent show to highlight AWS security issues
Amazon CEO Jeff Bezos will headline this week's first-ever AWS re: Invent cloud computing conference, where several sessions will cover security issues. News | 28 Nov 2012
-
Trend Micro issues cloud, mobile security assessment tools
Online assessment tests the security posture, but more detailed guidance documents and reports are available from government agencies and organizations. News | 27 Nov 2012
-
Crisis Trojan can infect VMware machines, Windows Mobile devices
The AV giant says the Windows version of the Crisis Trojan may be the first malware that can spread to so many different platforms. News | 22 Aug 2012
-
Eye On: Virtualization Security
SearchSecurity.com's "Eye On" series examines a security topic each month. In May, the series explores virtualization security and the technologies and methodologies available to reduce vulnerabilities and improve virtualization processes. Article | 25 May 2011
-
Reduce virtualization security risks by thinking physical, experts say
Firms reassessing their virtualized infrastructure should apply the same security best practices they’ve been using to secure their physical systems. News | 25 May 2011
-
LynuxWorks demonstrates enterprise platform for secure virtualization
LynuxWorks demonstrated its enterprise platform for secure virtualization running on multiple devices and using ValidEdge Network Malware Security (NMS) LynxSecure. Article | 15 Feb 2011
-
Emerging theme at RSA Conference 2011 may be 'mostly cloudy'
Security vendors at RSA Conference 2011 need to be more specific about the security technologies they are aiming at the cloud, industry analysts say. Article | 10 Feb 2011
-
Amazon Web Services security evangelist quits
Steve Riley, Amazon's cloud security guru, has quit the company. Where did he end up, and what's the next move for Amazon Web Services? News | 25 Jan 2011
-
Juniper acquires Altor for virtual machine security
Juniper Networks acquired Altor Networks in a $95 million deal to sell its virtualization security technologies alongside security appliances that protect physical systems. Article | 06 Dec 2010
- See more News on Virtualization Security Issues and Threats
-
Evaluating network security virtualization products
Don't risk making mistakes when you evaluate network security virtualization products. Our six key points will keep you on track. Tip
-
How to configure a VLAN to achieve the benefits of VLAN security
Expert Brad Casey explains how to configure a VLAN in order to achieve the benefits of VLAN security, including protection against insider attacks. Tip
-
Defending against watering hole attacks: Consider using a secure VM
Expert Nick Lewis analyzes the techniques employed by watering hole attacks and discusses how to use a secure VM to defend enterprises against them. Tip
-
The cost of compliance: Data center server virtualization compliance
Security expert Mike Chapple explores whether the cost of compliance outweighs the benefits afforded by enterprise data center server virtualization. Tip
-
Four VDI security concepts for every virtual desktop deployment
Traditional IT security measures don’t always apply well to virtual desktop infrastructures; apply these four VDI security concepts. Tip
-
How to connect virtual environments to DMZ network architecture
Connecting virtualized environments to DMZ network architecture creates new challenges. Network managers must learn new design methodologies to protect virtual traffic in the DMZ. Tip
-
Hypervisor security planning: Guidelines
With proliferation of server virtualization, hypervisor security is an emerging concern. Though theoretical, we look at the risks and mitigation measures. Tip
-
Auditing virtualization: Security training for infosec pros
This chapter discusses auditing virtualized environments, and begins with an overview of common virtualization technologies and key controls. Tip
-
Security in virtualization: IDS/IPS implementation strategy
Considering virtualization? Take into account that your IDS or IPS may not work the same way in a virtualized environment as it does in a physical one. Expert Dave Shackleford explains how to address this potential problem. Tip
-
How to maintain network control plane security
Use access control lists and secure configurations to maintain the security of your organization's network control plane. Tip
- See more Tips on Virtualization Security Issues and Threats
-
Which hypervisor features provide the most virtual server security?
The advent of integrated hypervisor features, focused on security, is welcome news to many admins, but which ones provide the most benefit? Answer
-
Though OS-independent, thin hypervisors provide solid security
If you think smaller hypervisors are more vulnerable, think again. A thin hypervisor may be more secure than bare-metal versions. Answer
-
Virtual security tactics for Type 1 and Type 2 hypervisors
It's no surprise that Type 1 and Type 2 hypervisors require different security considerations, but we asked an expert to clarify. Answer
-
The value of a virtual security gateway in the data center
Matthew Pascucci discusses virtual security gateway appliances and whether they are a virtual data center necessity or just an overhyped product. Answer
-
JeOs and the benefits of a virtual security appliance
A virtual security appliance offers enterprises a number of benefits, including an optimized operating system that simplifies patch management. Answer
-
Cloud computing providers and PCI virtualization requirements
How should an enterprise approach its cloud computing providers following the debut of the PCI virtualization requirements? Charles Denyer explains. Answer
-
Can the VMware PCI Compliance Checker assess my compliance posture?
The VMware PCI Compliance Checker claims to assess the compliance of a VMware virtual environment. Does it work? Charles Denyer has the answer. Answer
-
Virtualized behavior-based monitoring: Improving performance visibility
Learn about virtual behavior-based monitoring tactics, which allow for easy anomaly detection and can help defend a virtualization infrastructure. Answer
-
Security/virtualization concerns: Where to place a firewall connection
Is it worthwhile to place signature-based blocking technology before a firewall connection? Learn more in this expert response from Anand Sastry. Ask the Expert
-
Virtualization security concerns: The threat of hypervisor malware
What is hypervisor malware, and how worried should enterprises employing virtualization be about it? Threats expert Nick Lewis explains. Ask the Expert
- See more Expert Advice on Virtualization Security Issues and Threats
-
Five Steps to Incident Management in a Virtualized Environment
Incident management (IM) is a necessary part of a security program. When effective, it mitigates business impact, identifies weaknesses in controls, and helps fine-tune response processes. Traditional IM approaches, however, are not always effective ... Reference
-
AV storm
An AV storm is the performance degradation that occurs when antivirus software simultaneously scans multiple virtual machines (VMs) on a single physical host. Definition
-
Tackle virtualization compliance by balancing business, security needs
Security and business cultures don't always mesh, but virtualization compliance requires balance between them. Eric Ogren explains in this tutorial. Video
-
Revitalizing endpoint security with VDI desktops
Implementing VDI desktops provides an opportunity to re-architech endpoint security and management. Learn how in this supercast with Eric Ogren. Video
-
PCI encryption, virtualization standards: Interpreting PCI guidelines
Get expert advice on understanding the PCI encryption requirements and virtualization guidance in this video. Video
-
Integrating virtual-aware security technologies
In this video presentation, enterprise information security expert Dave Shackleford offers an overview of the key enterprise virtualization security product segments on the market today and key considerations for when to consider them. Video
-
Countdown: Top 5 issues involving data loss and the virtualized cloud
In this podcast, learn the issues to consider when moving data into the cloud and how to work with your provider on security. Podcast
-
Who should secure virtual IT environments? (Part 2)
Popular security blogger Chris Hoff and Citrix CTO Simon Crosby discuss whether security companies or virtualization vendors should be responsible for the security of virtual environments. Video
-
Who should secure virtual IT environments?
Security blogger Chris Hoff and Citrix CTO Simon Crosby discuss whether security companies or virtualization vendors should be responsible for the security of virtual environments. Video
-
Black Hat DC 2009: Joanna Rutkowska on Intel TXT flaws
In this session excerpt, researcher Joanna Rutkowska explains flaws discovered in current Intel Trusted Execution Technology (TXT) implementations and how they can be exploited. Video
-
Virtualization: Disruptive technologies part 4
Is there a future for vendors offering security solutions for virtualized environments, or will security eventually be almost entirely built-in? Experts Chris Hoff, Rich Mogull and Dino Dai Zovi discuss. Video
-
Virtualization: Disruptive technologies part 3
Security experts Chris Hoff, Rich Mogull and Dino Dai Zovi talk about the organizational challenges of virtualization, including the most dangerous way to use virtualization in the enterprise. Video
- See more Multimedia on Virtualization Security Issues and Threats
-
Three hypervisor and virtual environment security concerns
Virtualization offers many benefits but also comes with plenty of risks. Keep these three things in mind when planning virtual environment security. Feature
-
Which hypervisor features provide the most virtual server security?
The advent of integrated hypervisor features, focused on security, is welcome news to many admins, but which ones provide the most benefit? Answer
-
Though OS-independent, thin hypervisors provide solid security
If you think smaller hypervisors are more vulnerable, think again. A thin hypervisor may be more secure than bare-metal versions. Answer
-
Virtual security tactics for Type 1 and Type 2 hypervisors
It's no surprise that Type 1 and Type 2 hypervisors require different security considerations, but we asked an expert to clarify. Answer
-
Evaluating network security virtualization products
Don't risk making mistakes when you evaluate network security virtualization products. Our six key points will keep you on track. Tip
-
Case Study: US supermarket chain solves security challenge virtually
A US supermarket chain has implemented an endpoint security system to secure legacy applications and to save additional development Case Study
-
The value of a virtual security gateway in the data center
Matthew Pascucci discusses virtual security gateway appliances and whether they are a virtual data center necessity or just an overhyped product. Answer
-
How to configure a VLAN to achieve the benefits of VLAN security
Expert Brad Casey explains how to configure a VLAN in order to achieve the benefits of VLAN security, including protection against insider attacks. Tip
-
Defending against watering hole attacks: Consider using a secure VM
Expert Nick Lewis analyzes the techniques employed by watering hole attacks and discusses how to use a secure VM to defend enterprises against them. Tip
-
Five Steps to Incident Management in a Virtualized Environment
Incident management (IM) is a necessary part of a security program. When effective, it mitigates business impact, identifies weaknesses in controls, and helps fine-tune response processes. Traditional IM approaches, however, are not always effective ... Reference
- See more All on Virtualization Security Issues and Threats
About Virtualization Security Issues and Threats
Get advice from the experts on all things virtualization security, such as virtualization management, tools, products, training and software. Also Learn how the emergence of virtualization products and technology affect enterprise security.
Security Management Strategies for the CIO