Email Alerts
-
Evaluating network security virtualization products
Don't risk making mistakes when you evaluate network security virtualization products. Our six key points will keep you on track. Tip
-
How to configure a VLAN to achieve the benefits of VLAN security
Expert Brad Casey explains how to configure a VLAN in order to achieve the benefits of VLAN security, including protection against insider attacks. Tip
-
Defending against watering hole attacks: Consider using a secure VM
Expert Nick Lewis analyzes the techniques employed by watering hole attacks and discusses how to use a secure VM to defend enterprises against them. Tip
-
The cost of compliance: Data center server virtualization compliance
Security expert Mike Chapple explores whether the cost of compliance outweighs the benefits afforded by enterprise data center server virtualization. Tip
-
Four VDI security concepts for every virtual desktop deployment
Traditional IT security measures don’t always apply well to virtual desktop infrastructures; apply these four VDI security concepts. Tip
-
How to connect virtual environments to DMZ network architecture
Connecting virtualized environments to DMZ network architecture creates new challenges. Network managers must learn new design methodologies to protect virtual traffic in the DMZ. Tip
-
Hypervisor security planning: Guidelines
With proliferation of server virtualization, hypervisor security is an emerging concern. Though theoretical, we look at the risks and mitigation measures. Tip
-
Auditing virtualization: Security training for infosec pros
This chapter discusses auditing virtualized environments, and begins with an overview of common virtualization technologies and key controls. Tip
-
Security in virtualization: IDS/IPS implementation strategy
Considering virtualization? Take into account that your IDS or IPS may not work the same way in a virtualized environment as it does in a physical one. Expert Dave Shackleford explains how to address this potential problem. Tip
-
How to maintain network control plane security
Use access control lists and secure configurations to maintain the security of your organization's network control plane. Tip
Security Management Strategies for the CIO