Please turn on your JavaScript for this page to function normally.
Microsoft Azure
Microsoft rolls out new security capabilities for Azure customers

Microsoft has announced new security features for customers of its Azure cloud computing service. They are a mix of features for storage and compute services: Advanced Threat …

cloud
Security and privacy still the top inhibitors of cloud adoption

Cloud adoption is gaining momentum, as 36 percent of organizations are currently in the process of migrating to the cloud while close to 20 percent consider themselves to be …

Oracle VirtualBox
VirtualBox Guest-to-Host escape 0day and exploit released online

Independent vulnerability researcher Sergey Zelenyuk has made public a zero-day vulnerability he discovered in VirtualBox, the popular open source virtualization software …

abstract
Are SMBs driving the adoption of security automation by enterprises?

If you tracked the lifecycle of new security technologies, you’d likely see that most start as enterprise solutions and eventually trickle down to small and medium-sized …

general virtual digital
Dell EMC plugs critical bugs in VMAX enterprise storage offerings

Dell EMC has patched two critical flaws in vApp Manager, the management interface for its VMAX enterprise storage systems, and is urging all customers to implement fixes as …

gears automate
Orchestrating security across multiple environments

In an effort to help organizations centralize their intelligence and security process management, ThreatConnect has expanded its security platform’s capabilities to …

Passages
Passages: Secure virtual browser for malware isolation

Over 90% of undetected attacks come through the web. In this podcast recorded at RSA Conference 2017, Lance Cottrell, Chief Scientist at Ntrepid, talks about Passages, a …

cloud
Navigating a way through the cloud

Private cloud is a compelling proposition for many businesses. With the help of server virtualisation, you can take your own infrastructure; make it ‘cloud-like’ and because …

architecture
Seven myths for hyperconverged integrated systems

As with many new technology trends, certain assumptions and hype emerge that can influence buyer behavior and lead to poor decisions. Gartner has identified seven of the most …

Windows Defender Application Guard
Microsoft equips Edge with hardware-based container

Microsoft has announced a new capability that will make its Edge browser the most secure web browsing option for enterprises: Windows Defender Application Guard. Windows …

Compromising Linux virtual machines via FFS Rowhammer attack

A group of Dutch researchers have demonstrated a variant of the Rowhammer attack that can be used to successfully compromise Linux virtual machines on cloud servers. The Flip …

Worldwide server virtualization market is reaching its peak

The worldwide x86 server virtualization market is expected to reach $5.6 billion in 2016, an increase of 5.7 percent from 2015, according to Gartner. Despite the overall …

Don't miss

Cybersecurity news