Virtualization
VDI Challenges: The Problem with VDI
Anyone who’s been in enterprise IT long enough has already heard of, tested or deployed virtual desktop infrastructure (VDI) solutions (like VMware and Citrix). And why not? The promises made by VDI ...
Leveraging the Cyber “High Ground”: How to Win the Endpoint Battle
For over 2,000 years, people have leveraged elevated terrain, or “high ground,” to gain a strategic advantage over enemies and protect their realm. The Chinese “Art of War” suggests high ground as ...
The Hysolate Perspective: HP Acquires Bromium
From app sandboxing to OS isolation: How the endpoint is evolving Last week, HP announced that it has acquired Bromium, maker of an app sandboxing product that uses virtual machines (VMs) to ...
Network Isolation with Virtual Endpoints
Network Isolation, the segmenting of a computer network into separate zones with distinct trust levels, for the purpose of containing hazards or reducing damage caused by a threat actor, is a hallmark ...
Hundreds of Vulnerable Docker Hosts Exploited by Cryptocurrency Miners
Docker is a technology that allows you to perform operating system level virtualization. An incredible number of companies and production hosts are running Docker to develop, deploy and run applications inside containers ...
VirtualBox zero-day flaw released on Github; working exploit available but no patch
An independent researcher has turned a bit rogue, disclosing a zero-day vulnerability in the popular VirtualBox virtualization software while expressing deep disagreement with the state of security research, and bug bounty standards ...
NEW Data Analytics Courses
Phoenix TS has added new Data Analytics courses to our public schedule. These five courses will help you increase your knowledge and skills to become a Big Data Expert! What is Data ...
We Have Answers: Questions the ‘How Virtualization Protects Your High-Value Assets’ Webinar
Thank you everyone who tuned in to watch our webinar on Bromium Protected App, and special thanks to our featured guest speaker – Theresa Lanowitz, Founder and Analyst with voke, Inc. We ...
Container Security Part 2 – Benchmarks to the Rescue
Containers are like BYOD (Bring Your Own Device). They are infiltrating our ranks, and InfoSec professionals’ gut reaction is to hesitate in including them in their environments. But instead of dismissing containers ...
Virtualization Flaw Uptick: It’s ‘Just Getting Underway’
Virtualization vulnerabilities are seeing a huge surge this year as security researchers start to truly take the microscope to the full range of virtualization software. Hypervisors increasingly are being used against every ...
