Email Alerts
-
A preview of PCI virtualization specifications
The PCI Data Security Standard has little to say about virtualization – for now. Michael Cobb explores which best practices are likely to appear in the council's upcoming clarification document. Tip
-
How to integrate the security of both physical and virtual machines
According to a recent Gartner Inc. research report, 60% of virtual machines will be less secure than their physical counterparts through 2009. Michael Cobb explores the challenges of securing a mixed infrastructure of physical and virtual machines. Tip
-
VM servers affected by Intel TXT exploit method
Though the flaws identified in TXT take great expertise to exploit, IT pros should ensure critical system software and VM servers are under lock and key control. Column
-
Learn about enterprise strategy for server virtualization single sign-on
Virtualization is a technology that's taking off, but how can information security professionals know how it will interact with their existing networks and applications? In this identity and access management expert response, learn how virtualizing a... Ask the Expert
-
Black Hat DC 2009: Joanna Rutkowska on Intel TXT flaws
In this session excerpt, researcher Joanna Rutkowska explains flaws discovered in current Intel Trusted Execution Technology (TXT) implementations and how they can be exploited. Video
-
Is it more secure to have a mainframe or a collection of servers?
The general public may think that mainframe computing is a thing of the past, but expert Michael Cobb reviews why the mainframe is still the cornerstone most large IT projects. Ask the Expert
-
Intel Trusted Execution Technology is flawed, Black Hat researchers show
Security researchers Joanna Rutkowska and colleague Rafal Wojtczuk, discovered new Intel bugs that would allow attackers to bypass Intel Trusted Execution Technology. Article
-
Virtualization challenges traditional security concepts
Despite some misgivings, IT security pros are finding virtual environments help centralize data, deploy patches more efficiently and thwart attackers. Column
-
Virtualization security moves to the fore in 2009
Virtualization platform vendors such as VMware and Citrix gear up to enhance security, as mainstream security companies slowly adapt. Article
-
Virtualization: Disruptive technologies part 3
Security experts Chris Hoff, Rich Mogull and Dino Dai Zovi talk about the organizational challenges of virtualization, including the most dangerous way to use virtualization in the enterprise. Video
Security Management Strategies for the CIO