Please turn on your JavaScript for this page to function normally.
Do you need a honeypot?

It might seem like a strange question, but I wonder how many readers are running a honeypot network in their infrastructure? If you’re not then let me be the first to …

Bootable USB flash drive for secure remote working

Cryptzone released AppGate MOVE (My Own Virtual Environment), a USB flash drive that provides a portable way to access information and applications securely from any computer. …

Half of enterprise networks will be obsolete within five years

Technology trends such as BYOD, video and virtualization are rapidly consuming network capacity and capabilities, and 45 percent of the enterprise networks assessed during …

Virtualization critical for disaster recovery

A BUMI survey, which polled CEOs, business owners and IT professionals at small- to mid-sized firms, found that 98 percent of respondents felt that more than one day to …

VMware Cookbook, 2nd Edition

With scores of step-by-step solutions, VMware Cookbook, 2nd Edition helps you work with VMware ESXi in a wide range of network environments. You’ll not only learn the …

Federated identity service based on virtualization

Radiant Logic released RadiantOne VDS 6. Designed to provide one logical access point for enterprise identities, it enables authentication and authorization across multiple …

Virtualized application delivery appliances from Array Networks

Array Networks announced its new APV 800 Series multi-tenant virtualized application delivery appliances and vAPV soft-ADCs. Powered by Array’s 64-bit SpeedCore …

US-CERT warns of Intel CPU flaw

A flaw in Intel chips leaves users of a number or x64-based operating systems vulnerable to system hijacking, the US Computer Emergency Readiness Team warns. “Some …

Qualys releases virtualized private cloud platform

Qualys introduced a private cloud version of its QualysGuard Cloud Platform that allows customers to host and operate the security and compliance platform within their data …

Database security and SIEM are top priorities

Database security and SIEM are among the top priorities due to increased advanced persistent threats, according to McAfee. Database security has been an ongoing concern for …

The potential of virtualization security

In this podcast recorded at RSA Conference 2012, Anup Ghosh, CEO of Invincea, tells us how security hasn’t advanced much in the past decade from a technology point of …

WatchGuard goes virtual with security

WatchGuard launched its entire line of content and network security products as virtualized solutions. Four editions of XTMv are being launched to meet the needs of small, …

Don't miss

Cybersecurity news