Please turn on your JavaScript for this page to function normally.
11-year-old VM escape bug opens host machines to compromise

CrowdStrike researchers have recently discovered a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms, which could be …

Waratek - RSA Conference 2015
Waratek named Most Innovative Company

Waratek was named the “Most Innovative Company at RSA Conference 2015” as part of the 10th annual Innovation Sandbox Contest. Innovation Sandbox Contest promotes new …

Red door
Real-time traffic analysis and inventory of virtualized assets

Catbird Insight, a visualization solution for cloud and on-premise virtual environments that helps organizations rapidly discover, organize and analyze their virtual fabric to …

What pokes holes in virtual environments?

While most companies believe virtualization technology is a strategic priority, there are clear risks that need to be addressed. Ixia surveyed more than 430 targeted …

Five key IT security trends for 2015

Here’s a look at five key IT security trends and solutions for 2015. Rise in security breaches The current high level of security breaches, from the largest organization …

What’s jeopardizing the safety of your datacenter?

Datacenters are fraught with hidden operational hazards, and because virtual infrastructure is extremely complex and dynamic, many vulnerabilities go undetected and can be …

Xen bug behind Amazon, Rackspace cloud servers reboot revealed

Last week, several of the largest public and private cloud providers such as Amazon and Rackspace have rebooted some of their servers after notifying users of the move and …

Virtual machines no longer keeping malware at bay

It used to be that running and working on a virtual machine could almost guarantee you complete avoidance of malware infections, but that time has passed, says Symantec …

40% of orgs running VMware still susceptible to Heartbleed

More than three months have passed since the discovery of the OpenSSL Heartbleed bug, and many systems are still vulnerable. According to data collected by data analytics …

Securing the virtual environment

So you have you a shiny new virtual environment up and running. You may have virtualised all your servers, so that your business-critical databases, CRM systems, ERP …

DB Networks’ virtual IDS stops advanced SQL injection attacks

DB Networks introduced the IDS-6300v intelligent security virtual appliance, a new solution based on the next-generation Core Intrusion Detection System (IDS) platform …

Most security managers under pressure to deliver apps faster

At the RSA Conference, Tufin announced the results of a survey of 169 security professionals on the current state of security operations. Conducted at Cisco Live! in Milan, …

Don't miss

Cybersecurity news