Recently, I've heard many security officers talking about using virtual machines as a way to increase security. If your developers need local administrator rights and privileges and they can't have ...
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
Virtualization is the hot new trend in corporate data centers today. Virtualization servers from Microsoft, VMware and XenSource allow many virtual computers to run on a single (real) computer system.
Back in September, the Center for Internet Security (CIS) released a whitepaper titled "Virtual Machine Security Guidelines - Version 1.0". In it, they addressed security concerns that apply to ...
The Maze ransomware operators have adopted a tactic previously used by the Ragnar Locker gang; to encrypt a computer from within a virtual machine. In May, we previously reported that Ragnar Locker ...
Start-up FireEye made its debut, announcing plans to ship a switch-based network-access control appliance next month that will let customers identify network-borne malware and attacks in order to ...
Virtualization security is always a hot topic of discussion. And now the Center for Internet Security (CIS) is joining in that discussion with its latest whitepaper titled "Virtual Machine Security ...
When VMware Inc. announced its Project Monterey strategy to redefine the data center last week, executives effused about the potential of the distributed processing model to redefine cybersecurity.
From a security perspective, containers are the Wild West – full of exciting possibilities, but also unfamiliar dangers. A study out of Forrester points to this mix of hopes and fears. In the report, ...
Comparison of security postures for containers and different types of hypervisors. Key measures of software security. Security certifications for virtualization solutions. How to improve the security ...
Virtualization has transcended being a novelty buzzword, or a noble computing experiment, and is now a resource used by corporate and law firm IT departments. It promises everything from a higher ...
Phishing sites are now using JavaScript to evade detection by checking whether a visitor is browsing the site from a virtual machine or headless device. Cybersecurity firms commonly use headless ...