Real-World Security in a Virtual Infrastructure – Part 1
Welcome to a new virtualization.info column. Here we will explore a largely uncharted territory: virtualization security. Researchers have been working on the topic since some time now and vendors have...
View ArticleReal-World Security in a Virtual Infrastructure – Part 2
Welcome back to the new virtualization.info security column. We started with a series about the real-worlds security risks of virtual infrastructures and our first part, published last week, was...
View ArticleReal-World Security in a Virtual Infrastructure – Part 3
In previous articles on this column we focused on issues lying just outside the core virtualization realm, like the way we manage virtual machines (as templates) or technical vulnerabilities afflicting...
View ArticleReal-World Security in a Virtual Infrastructure – Part 4
In this article, the last one of the first series of virtualization.info’s security column (see part 1, part 2 and part 3), we will discuss how virtualization impacts high-security environments. As we...
View ArticleReal-World Security in a Virtual Infrastructure – Part 5
In this column I have often highlighted how handling virtualization security is a far different matter from managing the old kind of security. Today, I’d like to discuss yet another example of these...
View ArticleReal-World Security in a Virtual Infrastructure – Part 6
A number of things can be said about virtual appliances (VAs). For a start, they can be a powerful vector to quickly deploy applications without the burden of setting up a possibly complex environment,...
View ArticleReal-World Security in a Virtual Infrastructure – Part 7
Network stability is a concept most system administrator instinctively know about: however, no organization actually had any need to willingly enforce it or even care about until recent years. It’s...
View Article
More Pages to Explore .....