In April 2004 I wrote my first article on the topic of virtualization security. I was trying to bring attention to the security aspects of this “new” technology that was getting quite a bit of hype at ...
Virtualization can be both a blessing and a curse, serving up improved security while at the same time hiding dangers Almost any IT department worth its salt is deploying virtualization technology ...
We’ve already discussed the relative lack of tools to secure virtualized servers and infrastructures, the problems inherent in adding bolt-on tools, risks in connecting a VM to the wrong part of a ...
There are plenty of virtualization security vendors leaping out of the shadows. Here are five new players worth a look.Altor Networks. This company's Virtual Network Security Analyzer and Virtual ...
eSpeaks’ Corey Noles talks with Rob Israch, President of Tipalti, about what it means to lead with Global-First Finance and how companies can build scalable, compliant operations in an increasingly ...
While mobile and smartphone security is the hot topic of the moment among virtualization security gurus, plenty of other virtualization security topics demand IT’s attention right now. At the recent ...
The crazy part? Most gamers have no idea this setting even exists.
Security expert Brien Posey outlined why the data layer is a prime target and shared practical protection principles: know what you have, limit access, encrypt data and use strong authentication.
One of the main reasons for deploying desktop virtualization is the security advantages it can provide, such as keeping sensitive data off the endpoint, according to Citrix. And Citrix is practicing ...
Defining a set of security and compliance policies is a key first step. But enforcing security policy is not as easy. Defining a set of security and compliance policies is a key step. Having a ...
Survey reveals one-third of enterprise security managers believe the technologies make security 'harder,' while one-third say it was 'easier' Is moving to virtualization and cloud computing making ...
In April 2004 I wrote my first article on the topic of virtualization security. I was trying to bring attention to the security aspects of this “new” technology that was getting quite a bit of hype at ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results