Virtualization

Virtualization news, analysis, research, how-to, opinion, and video.

minecraft illagers

xen project hypervisor panda mascot

Xen hypervisor faces third highly critical VM escape bug in 10 months

The Xen Project has fixed three vulnerabilities in its widely used hypervisor that could allow operating systems running inside virtual machines to access the memory of the host systems, breaking the critical security layer between...

cog systems d4 secure htc a9 splash screen

NSA suggests using virtualization to secure smartphones

The U.S. National Security Agency is now suggesting government departments and businesses should buy smartphones secured using virtualization, a technology it currently requires only on tablets and laptops

cloud security

Finding and protecting the crown jewels

Layer 7 visibility and stateful application controls are important aspects of cloud security—protecting business-critical applications and data.

xen project hypervisor panda mascot

Critical Xen hypervisor flaw endangers virtualized environments

A critical vulnerability in the widely used Xen hypervisor allows attackers to break out of a guest operating system running inside a virtual machine and access the host system's entire memory.

cloud security

The evolution of data center segmentation

Micro-segmentation, an evolution of network security, lets organizations add granular segmentation policies to their data center transformation strategy.

VMware

VMware patches critical virtual machine escape flaws

VMware has released critical security patches for vulnerabilities demonstrated during the recent Pwn2Own hacking contest that could be exploited to escape from the isolation of virtual machines.

smartphone shocked group

The high price of security shaming [Infographic]

Two-thirds of IT security professionals said they would pay an average of $124,000 to avoid public scandals associated with security breaches.

disaster recovery knob

What's next for Azure Site Recovery?

Microsoft’s Azure-based high availability disaster recovery service turns the cloud into your off-site failover for complex applications, and it can double as a migration strategy.

zero fan

New trends in zero-day vulnerabilities

Best practices to mitigate the risks of zero day vulnerabilities

quantum computing

Experts split on how soon quantum computing is coming, but say we should start preparing now

Whether quantum computing is 10 years away -- or is already here -- it promises to make current encryption methods obsolete, so enterprises need to start laying the groundwork for new encryption methods.

VMware headquarters

VMware removes hard-coded root access key from vSphere Data Protection

VMware released a hotfix for vSphere Data Protection (VDP) to change a hard-coded SSH key that could allow remote attackers to gain root access to the virtual appliance.

How Windows Server 2016 is tackling security

Windows Server 2016 could be a generational shift in security on par with Bill Gates’ introduction of Trustworthy Computing in 2002.

xen project hypervisor panda mascot

Xen Project patches serious virtual machine escape flaws

The Xen Project has fixed four vulnerabilities in its widely used virtualization software, two of which could allow malicious virtual machine administrators to take over host servers.

video

Case study: Using VCloud to replicate data offsite

At VMworld, Network World chatted with Tom White, IT Director at Environmental Science Corp., about how he virtualized disaster recovery using cloud technologies.

video

Behind the scenes of the VMworld hands-on labs

At VMworld, Network World's Brandon Butler gets a tour of the hands-on lab training areas to see what attendees learn from the experience.

New features in Windows 10 laptop

Respect: Windows 10 security impresses hackers

Windows is a popular attack target for criminals and researchers alike, but Microsoft has done a good job of making it harder to target security flaws in the OS

behavior clothesline

Do I know you? Solutions to help identify a stranger in your environment

How quickly can you identify anomalous behaviors?

mirror image

Companies high on virtualization despite fears of security breaches

While no one thinks security problems will go away, companies are willing to tolerate the risk in the name of agility, flexibility and lower costs.

Load More
You Might Also Like