virtualization
Do you need a honeypot?
It might seem like a strange question, but I wonder how many readers are running a honeypot network in their infrastructure? If you’re not then let me be the first to …
Bootable USB flash drive for secure remote working
Cryptzone released AppGate MOVE (My Own Virtual Environment), a USB flash drive that provides a portable way to access information and applications securely from any computer. …
Half of enterprise networks will be obsolete within five years
Technology trends such as BYOD, video and virtualization are rapidly consuming network capacity and capabilities, and 45 percent of the enterprise networks assessed during …
Virtualization critical for disaster recovery
A BUMI survey, which polled CEOs, business owners and IT professionals at small- to mid-sized firms, found that 98 percent of respondents felt that more than one day to …
VMware Cookbook, 2nd Edition
With scores of step-by-step solutions, VMware Cookbook, 2nd Edition helps you work with VMware ESXi in a wide range of network environments. You’ll not only learn the …
Federated identity service based on virtualization
Radiant Logic released RadiantOne VDS 6. Designed to provide one logical access point for enterprise identities, it enables authentication and authorization across multiple …
Virtualized application delivery appliances from Array Networks
Array Networks announced its new APV 800 Series multi-tenant virtualized application delivery appliances and vAPV soft-ADCs. Powered by Array’s 64-bit SpeedCore …
US-CERT warns of Intel CPU flaw
A flaw in Intel chips leaves users of a number or x64-based operating systems vulnerable to system hijacking, the US Computer Emergency Readiness Team warns. “Some …
Qualys releases virtualized private cloud platform
Qualys introduced a private cloud version of its QualysGuard Cloud Platform that allows customers to host and operate the security and compliance platform within their data …
Database security and SIEM are top priorities
Database security and SIEM are among the top priorities due to increased advanced persistent threats, according to McAfee. Database security has been an ongoing concern for …
The potential of virtualization security
In this podcast recorded at RSA Conference 2012, Anup Ghosh, CEO of Invincea, tells us how security hasn’t advanced much in the past decade from a technology point of …
WatchGuard goes virtual with security
WatchGuard launched its entire line of content and network security products as virtualized solutions. Four editions of XTMv are being launched to meet the needs of small, …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments