A Stark Reminder Of The Need For Virtual Security

A Stark Reminder Of The Need For Virtual Security

Now that the VENOM vulnerability has been dealt with, it’s time for technologists to seriously consider how ready they are for virtualization security.

Especially if you’re working in an organization with a significant investment in the cloud, this is one area you can’t afford to ignore any longer.

The VENOM vulnerability was discovered last May in an old string of code used in a majority of modern day virtualization hardware. The glitch allows an attacker to login to a virtual machine from the front door (e.g. buying space on AWS) and then “escape,” gaining code execution ability on the host, as well as any other VMs operating on that machine.

And while the threat was neutralized almost immediately with a series of patches, the story underlines a sad state of security in the virtualized world. As is the case with all major technological advances, security has lagged behind for years in the world of virtualized computing.

And it’s the IT department – not a lack of technology – that is to blame for the hold up.

[Read more…]

15 upgrade FAQs for Symantec Backup Exec 15

Upgrade FAQ Symantec Backup Exec 15

If you’re considering Backup Exec 15, this blog post has (almost) every detail you need to know in 15 questions. I parsed through Symantec’s documentation to provide the top 15 things you need to know about Symantec’s latest release. So let’s jump right in.

[Read more…]

Do you manage a security point product zoo?

McAfee Intel Security Connected

Purchasing the best-of-breed solutions in each security category has left many IT teams managing disparate tools. Now, IT managers feel more like they are managing a zoo, than a well connected security posture.

[Read more…]