Email Alerts
-
Don't fight cloud computing technology, says Symantec's Thompson
Security professionals should embrace the inevitable shift to cloud computing, Symantec Chairman John Thompson says. Article | 17 Nov 2010
-
Researchers develop malware detection for hypervisor security
New software called HyperSentry stealthily detects malware in the hypervisor running virtual environments and alerts administrators to respond to a compromise. Article | 23 Sep 2010
-
How will Intel buying McAfee affect the desktop virtualization industry?
If the acquisition results in a new generation of chipsets, it could be a very big cloud computing play. News | 23 Aug 2010
-
Customers pleased with Google Enterprise desktop security
Google Enterprise desktop customers praise the platform and tout its security and privacy features. News | 21 Jun 2010
-
Patch for Microsoft Virtual PC weakness unlikely
Microsoft said it has no plans to alter the Windows Virtual PC environment. Article | 18 Mar 2010
-
Microsoft Virtual PC zero-day flaw weakens virtual sessions
An error in Microsoft Virtual PC can make some harmless bugs on physical PCs to be much more serious in virtual environments, according to an advisory by Core Security. Article | 16 Mar 2010
-
How to steal a virtual machine and its data in 3 easy steps
Stealing a virtual machine and its data is pretty easy. If you know how it's done, you can figure out how to prevent it and avoid some potentially costly administrative missteps. Article | 07 Jan 2010
-
Web security strategy: Use cloud security services
Web security used to be mainly URL filtering and protocol validation, but as Eric Ogren explains, Web security clouds improve security with little impact on performance. Column | 24 Dec 2009
-
Security challenges with cloud computing services
Panel discusses cloud computing security issues including encryption and user authentication. Article | 21 Sep 2009
-
Secure virtual desktop software enables remote client security
Virtual desktops control endpoints and cut costs for an Atlanta-based financial company. The setup helps IT control core essentials and enforce acceptable use policy. Column | 15 Sep 2009
Security Management Strategies for the CIO