Please turn on your JavaScript for this page to function normally.
What’s jeopardizing the safety of your datacenter?

Datacenters are fraught with hidden operational hazards, and because virtual infrastructure is extremely complex and dynamic, many vulnerabilities go undetected and can be …

Xen bug behind Amazon, Rackspace cloud servers reboot revealed

Last week, several of the largest public and private cloud providers such as Amazon and Rackspace have rebooted some of their servers after notifying users of the move and …

Virtual machines no longer keeping malware at bay

It used to be that running and working on a virtual machine could almost guarantee you complete avoidance of malware infections, but that time has passed, says Symantec …

40% of orgs running VMware still susceptible to Heartbleed

More than three months have passed since the discovery of the OpenSSL Heartbleed bug, and many systems are still vulnerable. According to data collected by data analytics …

Securing the virtual environment

So you have you a shiny new virtual environment up and running. You may have virtualised all your servers, so that your business-critical databases, CRM systems, ERP …

DB Networks’ virtual IDS stops advanced SQL injection attacks

DB Networks introduced the IDS-6300v intelligent security virtual appliance, a new solution based on the next-generation Core Intrusion Detection System (IDS) platform …

Most security managers under pressure to deliver apps faster

At the RSA Conference, Tufin announced the results of a survey of 169 security professionals on the current state of security operations. Conducted at Cisco Live! in Milan, …

Dell releases secure, managed, ultra-mobile cloud access device

Dell announced Dell Wyse Cloud Connect, an ultra-compact and highly mobile cloud-access device that delivers desktop virtualization and personal cloud services to any HDMI- or …

Security concerns are still holding back cloud adoption

There are significant differences in public cloud infrastructure concerns between the cloud-wise, organizations that are currently using cloud services, and the cloud-wary, …

Hypervisor-based, hardware-assisted system monitoring

In the last few years, many different techniques have been introduced to analyse malicious binary executables. Most of these techniques take advantage of Virtual Machine …

Cloud strategies and adoption

The use of cloud computing is growing, and by 2016 this growth will increase to become the bulk of new IT spend, according to Gartner. 2016 will be a defining year for cloud …

McAfee protects workloads on private and public clouds

McAfee announced a new version of its data center security solution that addresses enterprises’ growing need to leverage the scalability and cost savings of running …

Don't miss

Cybersecurity news