VDI Security Best Practices: Breaking the Myth

CISOs and security professionals often refer to Virtual Desktop Infrastructure (VDI) (made popular by VMWare & Citrix) and other “remote application” solutions as security barriers that hackers have a hard time bypassing ...
VDI challenges explained

VDI Challenges: The Problem with VDI

Anyone who’s been in enterprise IT long enough has already heard of, tested or deployed virtual desktop infrastructure (VDI) solutions (like VMware and Citrix). And why not? The promises made by VDI ...

Leveraging the Cyber “High Ground”: How to Win the Endpoint Battle

For over 2,000 years, people have leveraged elevated terrain, or “high ground,” to gain a strategic advantage over enemies and protect their realm. The Chinese “Art of War” suggests high ground as ...

The Hysolate Perspective: HP Acquires Bromium

From app sandboxing to OS isolation: How the endpoint is evolving Last week, HP announced that it has acquired Bromium, maker of an app sandboxing product that uses virtual machines (VMs) to ...

Network Isolation with Virtual Endpoints

Network Isolation, the segmenting of a computer network into separate zones with distinct trust levels, for the purpose of containing hazards or reducing damage caused by a threat actor, is a hallmark ...
Hundreds of Vulnerable Docker Hosts Exploited by Cryptocurrency Miners

Hundreds of Vulnerable Docker Hosts Exploited by Cryptocurrency Miners

Docker is a technology that allows you to perform operating system level virtualization. An incredible number of companies and production hosts are running Docker to develop, deploy and run applications inside containers ...
VirtualBox E1000 Guest-to-Host Escape

VirtualBox zero-day flaw released on Github; working exploit available but no patch

An independent researcher has turned a bit rogue, disclosing a zero-day vulnerability in the popular VirtualBox virtualization software while expressing deep disagreement with the state of security research, and bug bounty standards ...
NEW Data Analytics Courses

NEW Data Analytics Courses

Phoenix TS has added new Data Analytics courses to our public schedule. These five courses will help you increase your knowledge and skills to become a Big Data Expert! What is Data ...
Protecting Your High Valued Assets with Theresa Lanowitz of voke

We Have Answers: Questions the ‘How Virtualization Protects Your High-Value Assets’ Webinar

Thank you everyone who tuned in to watch our webinar on Bromium Protected App, and special thanks to our featured guest speaker – Theresa Lanowitz, Founder and Analyst with voke, Inc. We ...
EH-Net - Container Security Part 2 - Shipping Pic

Container Security Part 2 – Benchmarks to the Rescue

Containers are like BYOD (Bring Your Own Device). They are infiltrating our ranks, and InfoSec professionals’ gut reaction is to hesitate in including them in their environments. But instead of dismissing containers ...
Loading...