virtualization
What’s jeopardizing the safety of your datacenter?
Datacenters are fraught with hidden operational hazards, and because virtual infrastructure is extremely complex and dynamic, many vulnerabilities go undetected and can be …
Xen bug behind Amazon, Rackspace cloud servers reboot revealed
Last week, several of the largest public and private cloud providers such as Amazon and Rackspace have rebooted some of their servers after notifying users of the move and …
Virtual machines no longer keeping malware at bay
It used to be that running and working on a virtual machine could almost guarantee you complete avoidance of malware infections, but that time has passed, says Symantec …
40% of orgs running VMware still susceptible to Heartbleed
More than three months have passed since the discovery of the OpenSSL Heartbleed bug, and many systems are still vulnerable. According to data collected by data analytics …
Securing the virtual environment
So you have you a shiny new virtual environment up and running. You may have virtualised all your servers, so that your business-critical databases, CRM systems, ERP …
DB Networks’ virtual IDS stops advanced SQL injection attacks
DB Networks introduced the IDS-6300v intelligent security virtual appliance, a new solution based on the next-generation Core Intrusion Detection System (IDS) platform …
Most security managers under pressure to deliver apps faster
At the RSA Conference, Tufin announced the results of a survey of 169 security professionals on the current state of security operations. Conducted at Cisco Live! in Milan, …
Dell releases secure, managed, ultra-mobile cloud access device
Dell announced Dell Wyse Cloud Connect, an ultra-compact and highly mobile cloud-access device that delivers desktop virtualization and personal cloud services to any HDMI- or …
Security concerns are still holding back cloud adoption
There are significant differences in public cloud infrastructure concerns between the cloud-wise, organizations that are currently using cloud services, and the cloud-wary, …
Hypervisor-based, hardware-assisted system monitoring
In the last few years, many different techniques have been introduced to analyse malicious binary executables. Most of these techniques take advantage of Virtual Machine …
Cloud strategies and adoption
The use of cloud computing is growing, and by 2016 this growth will increase to become the bulk of new IT spend, according to Gartner. 2016 will be a defining year for cloud …
McAfee protects workloads on private and public clouds
McAfee announced a new version of its data center security solution that addresses enterprises’ growing need to leverage the scalability and cost savings of running …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege