Email Alerts
-
Can virtualized applications interact without permission?
If a guest OS in a virtualized system is compromised, it could theoretically go through the hypervisor layer and compromise the rest of the guest operating systems. But what about an environment with virtualized applications? Ask the Expert
-
IBM announcements mark two years of ISS marriage
The ISS unit has produced a number of updates, including unified threat management for small businesses and a virtual appliance for its network intrusion prevention system (IPS). Article
-
Sourcefire adds VM protection to RNA, new appliance
Sourcefire announces virtual machine coverage and virtualization developments, which will extend network analysis, access control and vulnerability assessment. Article
-
Initial virtualization costs could outweigh benefits
It could be costly for companies to sort out the new governance, oversight and manageability issues being introduced by virtualized environments. Article
-
Virtual machine security plagued with operational issues
As companies move forward with virtual deployments, most successes are due to a strong operational framework. Article
-
How to build security into a virtualized server environment
Virtualization is a transformative technology, and while virtual servers promise to increase efficiency in the enterprise, some key security implications are often going ignored. Contributor Thomas Ptacek outlines the security issues in today's virtu... Tip
-
The unexpected costs of server virtualization?
Formerly dominated by a single vendor, VMWare Corp., the field of virtualization security now has more options. But what's the most cost-efficient way to go virtual? Platform security expert Michael Cobb gives advice. Ask the Expert
-
Virtualization tool assesses VMware security configurations
Hardening VMware's ESX Server has been a difficult job, but a new tool developed by VMware and partner Tripwire aims to ease the pain. Article
-
Five crucial virtualization do's and don'ts
In this month's issue of Information Security magazine, learn five virtualization security do's and don'ts. Read about virtualization products, segmentation, and implementation, and patching virtual machines. We review Credant Mobile Guardian 6.0, Ar... E-Zine
-
Virtualization security gains traction while IT budgets shrink
The SearchSecurity.com editorial team discusses virtualization security, the overcompliance mentality, PCI DSS changes, and tightening IT security budgets. Article
Security Management Strategies for the CIO