virtualization
![Microsoft Azure](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094655/microsoft_azure-400x200.jpg)
Microsoft rolls out new security capabilities for Azure customers
Microsoft has announced new security features for customers of its Azure cloud computing service. They are a mix of features for storage and compute services: Advanced Threat …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111640/cloud-400x200.jpg)
Security and privacy still the top inhibitors of cloud adoption
Cloud adoption is gaining momentum, as 36 percent of organizations are currently in the process of migrating to the cloud while close to 20 percent consider themselves to be …
![Oracle VirtualBox](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095800/oracle-virtualbox-400x200.jpg)
VirtualBox Guest-to-Host escape 0day and exploit released online
Independent vulnerability researcher Sergey Zelenyuk has made public a zero-day vulnerability he discovered in VirtualBox, the popular open source virtualization software …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101149/abstract-400x200.jpg)
Are SMBs driving the adoption of security automation by enterprises?
If you tracked the lifecycle of new security technologies, you’d likely see that most start as enterprise solutions and eventually trickle down to small and medium-sized …
![general virtual digital](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113219/general-virtual-400x200.jpg)
Dell EMC plugs critical bugs in VMAX enterprise storage offerings
Dell EMC has patched two critical flaws in vApp Manager, the management interface for its VMAX enterprise storage systems, and is urging all customers to implement fixes as …
![gears automate](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112046/automate-cogs-400x200.jpg)
Orchestrating security across multiple environments
In an effort to help organizations centralize their intelligence and security process management, ThreatConnect has expanded its security platform’s capabilities to …
![Passages](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105009/Passages-400x200.jpg)
Passages: Secure virtual browser for malware isolation
Over 90% of undetected attacks come through the web. In this podcast recorded at RSA Conference 2017, Lance Cottrell, Chief Scientist at Ntrepid, talks about Passages, a …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111640/cloud-400x200.jpg)
Navigating a way through the cloud
Private cloud is a compelling proposition for many businesses. With the help of server virtualisation, you can take your own infrastructure; make it ‘cloud-like’ and because …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105947/architecture-400x200.jpg)
Seven myths for hyperconverged integrated systems
As with many new technology trends, certain assumptions and hype emerge that can influence buyer behavior and lead to poor decisions. Gartner has identified seven of the most …
![Windows Defender Application Guard](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110458/MS-edge-sandbox-400x200.jpg)
Microsoft equips Edge with hardware-based container
Microsoft has announced a new capability that will make its Edge browser the most secure web browsing option for enterprises: Windows Defender Application Guard. Windows …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113844/attacks-400x200.jpg)
Compromising Linux virtual machines via FFS Rowhammer attack
A group of Dutch researchers have demonstrated a variant of the Rowhammer attack that can be used to successfully compromise Linux virtual machines on cloud servers. The Flip …
Worldwide server virtualization market is reaching its peak
The worldwide x86 server virtualization market is expected to reach $5.6 billion in 2016, an increase of 5.7 percent from 2015, according to Gartner. Despite the overall …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD