AMD Gets Cozy with ARM for Hybrid Chips, Security
Can the embattled chipmaker best Intel by teaming with ARM, the mobile processor king?
Tags: AMD fusion, security, ARM server, ARM, AMD
Can the embattled chipmaker best Intel by teaming with ARM, the mobile processor king?
Virtual Network Computing (VNC) enables you to use a GUI instead of a command-line interface when remotely connecting to a Linux or Unix machine, but security's another matter entirely. Discover how to make sure your VNC server connections stay secure.
Was VMware's recent security breach a bombshell or something barely worth raising an eyebrow about? A security expert weighs in.
Security software provider secures virtual machines running Windows and hints at markets beyond VMware.
As mobile devices in the enterprise grow by leaps and bounds, enterprises' ability to remotely manage them, including enforcing security policies and keeping data in sync, becomes ever more important. Here are four solutions to help resolve this growing data center dilemma.
Adopting virtualization technology often leads companies to carry out security, backup and other day-to-day activities in new and different ways. This often adds unnecessary costs and complexity. Symantec's solution? Keep it simple.
Seeking to reduce the time required to deploy load balancing for enterprise applications, Kemp Technologies has updated its LoadMaster firmware to support pre-configured application templates.
Learn tips for keeping your Linux system safe in this post-kernel.org-breach world.
WordPress is one of the most popular CMSes, which means it is among the more commonly exploited. Use the Exploit Scanner plugin to help lock it down.
Tags:
tip of the trade, plugin, Wordpress, security, exploits
Apache updates the world's most popular web server with a security update and a beta for the next generation of HTTP.
Tags:
open source software, Apache, HTTP, web server, security
DenyHosts makes it easy to ward off unauthorized SSH connection attempts. The utility blocks attempts to connect to your server via SSH after too many failed attempts or from a blacklisted host.
Tags:
open source software, tip of the trade, SSH, security
When your system is rooted, you can't trust most utilities to show processes from the rootkit. To identify the problem, check out unhide and unhide.rb.
Tags:
tip of the trade, open source tool, rootkit, security, open source software
When it comes to beefing up the security of your virtualized IT environment, to whom are you going to turn?
Tags:
virtualization technology, server virtualization, security, Security Advisory, hypervisor
A lack of understanding of security risks is one of the key factors hampering cloud computing adoption. Find out the five most overlooked threats to the technology.
Tags:
virtualization, cloud security, security, cloud computing, hypervisor
When it comes to security in the public cloud, you're on your own. Your cloud provider will not help protect your systems from hackers and other attacks beyond protecting its own infrastructure. However, with due diligence you can minimize your risks.
Tags:
server security, public cloud, security
Security is the primary reason you should never consider deploying any these 10 workloads to a public cloud.
Tags:
cloud computing, security, public cloud, customer relationship management, deployment
Coming up with good passwords is never easy. Enter Pwgen, a utility that generates random (but pronounceable) passwords.
Tags:
Security practices, password, Linux, security, tip of the trade
Yum Plugins make it easy to extend the open source tool's functionality. The security plugin and the priorities plugins are a great place to start.
Tags:
open source, open source software, open source tool, tip of the trade, security
Whether you're a sys admin who needs physical access to a server in the data center or a business owner moving your data center to the cloud, it is important to meet the people who support and maintain your data center.
Tags:
security, data center facilities management, staffing, system administrator, data center management
'Security through virtualization' is a strategy that's bound to fail. So how do you protect your virtual machines? By testing virtualization systems methodically. One way to accomplish this is to break virtualization by switching to virtual 8086 mode.
Tags:
virtual server, server virtualization, security, 8086 mode, Virtual Server Security
When it comes to Windows server security, it's all about reaction time.
Tags:
security best practices, security, Windows Server security, Windows Server, OS
The Windows SSH client, PuTTY, is incredibly useful and becomes even more so when set up with a private/public keypair.
Tags:
Windows, security, SSH, tip of the trade, open source software
It takes more than mere compliance to keep your organization truly secure.
Tags:
viruses, customer data, compliance, security, password
Firewalls and intrusion prevention systems (IPS) may not be enough to defend against malicious hypervisors.
Tags:
server security, security, virtualization, server virtualization
Server virtualization may have caught on far and wide, but the technology for
securing virtual environments lags. Regaining visibility at the access layer
is critical to keeping your data safe. Here are three ways to accomplish this.
Tags:
virtual machine, data center, server virtualization, virtual server, security
The latest security research from Secunia shows security vulnerabilities among the
major vendors increasing as much as fourfold in the past four years. Apple may
think it stands apart, but its record is spotty, and with iPhone jailbreaks
now 'legal,' its security woes may only be beginning.
Tags:
Apple, security, iPhone, jailbreak, security vulnerabilities
Five new virtualization applications are designed to simplify life for IT managers and ease the complexity of moving virtual data loads throughout the organization.
Tags:
software, security, virtualization, management, CA
Are security issues holding your company back from deploying cloud computing?
Asking key questions and trusting your intuition goes a long way in reducing
the likelihood of security issues cropping up.
Tags:
security, cloud security, cloud computing
New virtual and appliance offerings from Core Security aim to improve businesses' security by automating testing -- helping IT admins gather more 'Insight' into what's at risk.
Tags:
Core Security, penetration testing, server virtualization, security
Trend Micro's virtualization technologies offer security for virtual environments.
Tags:
VDI, secure virtual enviornment, security, virtualization technologies
By now, it's practically canon that bad passwords can have catastrophic consequences. What can a security admin do to ensure users are doing their part for server security? Enter Medusa, an open source software password auditing tool for Linux that will put all of your organization's passwords to the test.
Tags:
open source software, security, security audit, medusa
The free DNS service uses a special name server to block known malware and phishing websites.
Tags:
malware, Symantec, security, server tool, DNS service
The companies have announced a partnership to make virtual desktop security simpler for large enterprise deployments.
Tags:
security, virtual desktop, McAfee, Citrix
You've built a virtual fortress to keep strangers off of your servers and out of your data center, but did you know your greatest enemy is more likely to be one of your own employees?
Tags:
security, server security, data center security, cyber security
Gartner Outlines Six Most Common Virtualization Security Risks and How to Combat Them
Tags:
security, server, VMware, virtualization
The benefits of public clouds are obvious, but what about the pitfalls?
Tags:
server, public cloud, Cloud, security, Enterprise
The 10.6.3 Snow Leopard update includes bug fixes, improvements, and security fixes.
Tags:
snow leopard, Exchange, Mac OS, server, security
There are a number of security issues to consider when planning and deploying server virtualization.
Tags:
security, virtualization technologies, ESX Server, VMM, virtual server
A little planning and preparation can help you avoid a potential cloud nightmare.
Tags:
public cloud, security, Cloud server, cloud service, cloud computing
Authorization Manger makes secure server virtualization more than a pipe dream. These best practices show you the two best ways to secure Hyper-V Server and virtual machines using Authorization Manager.
Tags:
virtual, Microsoft, security, Hyper-V, server virtualization
A handful of vulnerabilities in Apache Web server get fixed, including one flaw that impacts only Windows systems.
Tags:
security, Apache, httpd, apache web server, patches
Virtually Speaking: VMware, Intel and RSA have partnered to make cloud computing more secure, for
the private cloud. Will anyone care?
Tags:
security, RSA, Intel, VMware, private cloud
QualysGuard Malware Detection allows Web server administrators to perform automatic scans of external-facing Web servers.
Tags:
security, service, web server, scanning, malware
GlobalSCAPE, Inc. has announced enhancements to its enterprise MFT solution, and a new customer deployment at AMD.
Tags:
Enhanced File Transfer Server, EFT, security, MFT, globalscape
Zeus is old, but the more than 70,000 unique variants is still good at stealing credentials.
Tags:
security, SSL, Enterprise, botnet, Zeus
Configuring Windows Server 2008 features will improve authentication and access control in your network.
Tags:
configurations, Windows Server 2008, authentication, security, access controls
What happens when businesses begin outsourcing the technology that has been defined by their processes?
Tags:
cloud computing, Cloud, standards, security
The new software gives smaller businesses smartphone security without paying enterprise-level costs.
Tags:
server, mobile, RIM, security, smartphone
Enterprises are not ready to tap in to
public clouds, but many are experimenting with private cloud computing.
Tags:
Enterprise, security, private cloud, Cloud
Enterprise-friendly servers and security controls help control third-party mobile apps.
Tags:
mobile, server, applications, security, Enterprise
When it comes to the cloud there are obvious benefits and a few challenges too.
Tags:
network, security, public cloud, Cloud
'Private cloud' is a term heard often these days. What does it actually mean?
Tags:
Cloud, cloud computing, security, private cloud
Internet service provider, Network Solutions, recently experienced a limited attack on Web sites hosted on their Unix servers.
Tags:
security
Virtually Speaking: Two sets of survey results released this week point to security as the next major hurdle for virtualization.
Tags:
Symantec, security, CDW, virtualization
While 90 percent of enterprises surveyed by CDW have virtualized portions of their datacenters, 62 percent are still keeping "critical" apps on physical servers.
Tags:
datacenter, CDW, virtualization, security
A zero-day vulnerability in IIS revealed on Christmas day allows attackers to bypass file extension protections using a semicolon after an executable extension.
Tags:
IIS, security, vulnerability, Microsoft
When deploying virtualization technologies, key choices must be made to ensure the environment is secure. This article explains how to use Authorization Manager to make Hyper-V as secure as it can be.
Tags:
virtual, Windows Server 2008, Hyper-V, security, operating system
Tip of the Trade: ssh-agent makes it possible to avoid having to
type in a passphrase for each login. Helpfully, since the Leopard release on
Mac OS X this functionality is built straight in.
Tags:
tip of the trade, security, Mac OS X, tips
Cover Your Assets: Security is both necessary and good, but can it make your environment less usable?
Single sign-on and virtual LANs are two options for securing your internal environment with minimal performance impact.
Tags:
security, frugality, VLAN, single sign-on
Cover Your Assets: Open source software is all about freedom, but is the price of freedom too high?
Tags:
security, frugality, virtualization, open source, Linux
A Security Advisory issued late Tuesday from Redmond warns users of a critical zero-day flaw in the FTP capability of older versions IIS Web server software.
Tags:
zero-day, IIS, web server, security, FTP
For a virtual infrastructure to be a success it must be secure. A just-released report from RSA noted that despite the complex security and compliance risks enterprises face when they adopt virtualization, companies that succeed will reap a 'security bonus.'
Tags:
EMC, security, RSA, virtualization
If the analysts are to be believed, Twitter is here to stay and will become increasingly pervasive in the months to come. Contrary to popular belief, there is business value in it. Learn how to get the most out of it while avoiding security pitfalls and other headaches.
Tags:
social networking, security, instant messaging, Twitter, Gartner
Tip of the Trade: An adapted version of ConnectBot makes it easier to access email on your mobile devices using Mutt and SSH.
Tags:
OS, security, G1, mobile, mobile phones