dcsimg

security Tag Index

Red Hat Enterprise Linux 6.5 Delivers Precision Timing

Red Hat's new enterprise Linux release debuts with new security, virtualization and time-keeping features.


Tags: Red Hat, virtualization, precision timing, Linux, RHEL 6.5, security, Network Timing Protocol, Precision Timing Protocol, Enterprise

AMD Gets Cozy with ARM for Hybrid Chips, Security

Can the embattled chipmaker best Intel by teaming with ARM, the mobile processor king?


Tags: ARM server, security, AMD fusion, AMD, ARM

Securing a VNC Server on Linux with SSH

Virtual Network Computing (VNC) enables you to use a GUI instead of a command-line interface when remotely connecting to a Linux or Unix machine, but security's another matter entirely.  Discover how to make sure your VNC server connections stay secure.


Tags: Linux, server tutorial, vnc, security, SSH, tutorial, tutorials, Linux server

VMware Source Code Leak Reveals Virtualization Security Concerns

Was VMware's recent security breach a bombshell or something barely worth raising an eyebrow about?  A security expert weighs in.


Tags: Security Breaches, VMware, server virtualization, virtualization, security

Intel Accelerates Servers with Xeon E5 Chip Launch

Latest Intel server chip release delivers new I/O, security and performance gains.


Tags: xeon e5, security, Xeon, I/O, Intel

Kaspersky Previews Anti-malware for VMware Environments

Security software provider secures virtual machines running Windows and hints at markets beyond VMware.


Tags: Kaspersky Labs, virtual machine, security, VMware, Kaspersky, VM

4 Mobile Management Solutions to Keep Your Enterprise Secure and in Sync

As mobile devices in the enterprise grow by leaps and bounds, enterprises' ability to remotely manage them, including enforcing security policies and keeping data in sync, becomes ever more important. Here are four solutions to help resolve this growing data center dilemma.


Tags: security, mobile device, mobile device management, open source software, email, mobile, Zimbra

Why the Ideal Virtual Infrastructure Is 'Boring Business as Usual'

Adopting virtualization technology  often leads companies to carry out security, backup and other day-to-day activities in new and different ways. This often adds unnecessary costs and complexity. Symantec's solution? Keep it simple.


Tags: security, Storage, server virtualization, Symantec, cloud computing

Kemp Adds Pre-Configured Templates to Load Balancer Firmware

Seeking to reduce the time required to deploy load balancing for enterprise applications, Kemp Technologies has updated its LoadMaster firmware to support pre-configured application templates.


Tags: security, template, Kemp Technologies, load balancing

Kernel Developers Share Security Tips

Learn tips for keeping your Linux system safe in this post-kernel.org-breach world.


Tags: security, Kernel.org, Linux security, SSH, tip of the trade

10 Secure Linux Distributions You Need To Know About

If security is a primary concern for you (it should be), introduce yourself to 10 secure Linux distributions ready to work in any environment from small to enterprise to cloud.


Tags: security, Linux distribution, Linux, open source, distribution

Check WordPress for Exploits

WordPress is one of the most popular CMSes, which means it is among the more commonly exploited. Use the Exploit Scanner plugin to help lock it down.
Tags: security, tip of the trade, Wordpress, exploits, plugin

Apache Updates HTTP Web Server for Security and the Future

Apache updates the world's most popular web server with a security update and a beta for the next generation of HTTP.
Tags: HTTP, web server, Apache, security, open source software

DenyHosts: Keep on Knocking but You Can't Come In

DenyHosts makes it easy to ward off unauthorized SSH connection attempts. The utility blocks attempts to connect to your server via SSH after too many failed attempts or from a blacklisted host.
Tags: open source software, security, SSH, tip of the trade

Discover Rootkits With Unhide

When your system is rooted, you can't trust most utilities to show processes from the rootkit. To identify the problem, check out unhide and unhide.rb.
Tags: open source tool, open source software, rootkit, security, tip of the trade

Making Your Virtual Security Real

When it comes to beefing up the security of your virtualized IT environment, to whom are you going to turn?
Tags: virtualization technology, server virtualization, security, Security Advisory, hypervisor

Security: The Biggest Holdup to Cloud Computing

A lack of understanding of security risks is one of the key factors hampering cloud computing adoption. Find out the five most overlooked threats to the technology.
Tags: cloud security, virtualization, hypervisor, cloud computing, security

4 Easy Steps to Securing Your Servers in the Public Cloud

When it comes to security in the public cloud, you're on your own. Your cloud provider will not help protect your systems from hackers and other attacks beyond protecting its own infrastructure. However, with due diligence you can minimize your risks.
Tags: security, public cloud, server security

10 Workloads That Should Never Go in a Public Cloud

Security is the primary reason you should never consider deploying any these 10 workloads to a public cloud.
Tags: security, customer relationship management, deployment, public cloud, cloud computing

Generate Secure Passwords With Pwgen

Coming up with good passwords is never easy. Enter Pwgen, a utility that generates random (but pronounceable) passwords.
Tags: password, tip of the trade, security, Security practices, Linux

More Yum Plugins: Security and Package Priority

Yum Plugins make it easy to extend the open source tool's functionality. The security plugin and the priorities plugins are a great place to start.
Tags: open source, open source software, open source tool, tip of the trade, security

The 5 People You Meet in the Data Center

Whether you're a sys admin who needs physical access to a server in the data center or a business owner moving your data center to the cloud, it is important to meet the people who support and maintain your data center.
Tags: data center management, data center facilities management, security, staffing, system administrator

Use Virtual 8086 Mode to Secure Virtual Servers

'Security through virtualization' is a strategy that's bound to fail. So how do you protect your virtual machines? By testing virtualization systems methodically. One way to accomplish this is to break virtualization by switching to virtual 8086 mode.
Tags: virtual server, server virtualization, security, 8086 mode, Virtual Server Security

Windows Server Security Best Practices

When it comes to Windows server security, it's all about reaction time.
Tags: OS, security, Windows Server security, security best practices, Windows Server

Open Source Windows SSH Client Delivers Security Boost

The Windows SSH client, PuTTY, is incredibly useful and becomes even more so when set up with a private/public keypair.
Tags: Windows, security, SSH, tip of the trade, open source software

Scaling the Security Chasm

It takes more than mere compliance to keep your organization truly secure.
Tags: viruses, compliance, security, customer data, password

Server Virtualization Presents New Security Concerns

Firewalls and intrusion prevention systems (IPS) may not be enough to defend against malicious hypervisors.
Tags: virtualization, security, server security, server virtualization

3 Ways to Secure Your Virtualized Data Center

Server virtualization may have caught on far and wide, but the technology for securing virtual environments lags. Regaining visibility at the access layer is critical to keeping your data safe. Here are three ways to accomplish this.
Tags: virtual machine, security, server virtualization, virtual server, data center

'Secure OS': The Latest IT Oxymoron

The latest security research from Secunia shows security vulnerabilities among the major vendors increasing as much as fourfold in the past four years. Apple may think it stands apart, but its record is spotty, and with iPhone jailbreaks now 'legal,' its security woes may only be beginning.
Tags: iPhone, Apple, jailbreak, security, security vulnerabilities

CA Debuts 5 Virtualization Management Apps

Five new virtualization applications are designed to simplify life for IT managers and ease the complexity of moving virtual data loads throughout the organization.
Tags: software, management, virtualization, security, CA

Cloud Computing With Less Security Risk

Are security issues holding your company back from deploying cloud computing? Asking key questions and trusting your intuition goes a long way in reducing the likelihood of security issues cropping up.
Tags: cloud computing, security, cloud security

Improve IT Security With Server Virtualization

New virtual and appliance offerings from Core Security aim to improve businesses' security by automating testing -- helping IT admins gather more 'Insight' into what's at risk.
Tags: server virtualization, Core Security, penetration testing, security

Trend Micro Secures Enterprise Virtualization Technologies

Trend Micro's virtualization technologies offer security for virtual environments.
Tags: VDI, secure virtual enviornment, security, virtualization technologies

Medusa: Open Source Software 'Login Brute-Forcer' for Password Auditing

By now, it's practically canon that bad passwords can have catastrophic consequences. What can a security admin do to ensure users are doing their part for server security? Enter Medusa, an open source software password auditing tool for Linux that will put all of your organization's passwords to the test.
Tags: medusa, security, security audit, open source software

Symantec's Free DNS Service Blocks Malware

The free DNS service uses a special name server to block known malware and phishing websites.
Tags: Symantec, malware, security, server tool, DNS service

New Tool Addresses JBoss Server Security

The upcoming AthCon conference will highlight the security risks facing JBoss server admins.
Tags: server, security, JBoss

Citrix, McAfee Make Virtual Desktop Security Simpler

The companies have announced a partnership to make virtual desktop security simpler for large enterprise deployments.
Tags: security, virtual desktop, Citrix, McAfee

Server Security: The Threat from Within

You've built a virtual fortress to keep strangers off of your servers and out of your data center, but did you know your greatest enemy is more likely to be one of your own employees?
Tags: server security, cyber security, security, data center security

Gartner Says 60 Percent of Virtualized Servers Will Be Less Secure Than the Physical Servers They Replace Through 2012

Gartner Outlines Six Most Common Virtualization Security Risks and How to Combat Them
Tags: VMware, security, virtualization, server

WatchGuard Announces Quarantine Management Server

WatchGuard offers businesses protection against spam, phishing and malware-laden messages.
Tags: spam, server, security, appliance, malware

VirusBarrier Server Has New Defense Update

VirusBarrier Server 3 runs on 64-bit code and includes a number of new security features.
Tags: malware, server, virus, security, Mac OS X

Testing Enterprise Public Clouds

The benefits of public clouds are obvious, but what about the pitfalls?
Tags: Cloud, security, public cloud, Enterprise, server

Mac OS X 10.6.3 Client and Server Versions

The 10.6.3 Snow Leopard update includes bug fixes, improvements, and security fixes.
Tags: Exchange, server, Mac OS, snow leopard, security

Server Virtualization Security Issues

There are a number of security issues to consider when planning and deploying server virtualization.
Tags: VMM, security, ESX Server, virtualization technologies, virtual server

Jumping on the Cloud? Consider these Security Issues

A little planning and preparation can help you avoid a potential cloud nightmare.
Tags: cloud computing, public cloud, Cloud server, cloud service, security

Secure Server Virtualization Using Hyper-V

Authorization Manger makes secure server virtualization more than a pipe dream. These best practices show you the two best ways to secure Hyper-V Server and virtual machines using Authorization Manager.
Tags: security, server virtualization, Hyper-V, virtual, Microsoft

Apache Web Server Flaws Patched

A handful of vulnerabilities in Apache Web server get fixed, including one flaw that impacts only Windows systems.
Tags: apache web server, Apache, httpd, patches, security

Data Center Jobs in Demand: IT Security

When it comes to data center jobs, IT security is the place to be. Salaries are on the rise as demand for security pros grows.
Tags: survey, salaries, security, IT

VMware, RSA, Intel Join Forces to Secure Cloud Computing Environment

Virtually Speaking: VMware, Intel and RSA have partnered to make cloud computing more secure, for the private cloud. Will anyone care?
Tags: security, private cloud, RSA, Intel, VMware

Qualys Offers Free Web Server Scanning

QualysGuard Malware Detection allows Web server administrators to perform automatic scans of external-facing Web servers.
Tags: scanning, web server, security, service, malware

GlobalSCAPE Adds Enhanced File Transfer to Enterprise MFT Solution

GlobalSCAPE, Inc. has announced enhancements to its enterprise MFT solution, and a new customer deployment at AMD.
Tags: globalscape, EFT, Enhanced File Transfer Server, security, MFT

Keeping the Zeus Botnet Out of Your Enterprise

Zeus is old, but the more than 70,000 unique variants is still good at stealing credentials.
Tags: Enterprise, security, botnet, Zeus, SSL

Using Access Controls on Windows Server 2008

Configuring Windows Server 2008 features will improve authentication and access control in your network.
Tags: access controls, configurations, authentication, Windows Server 2008, security

The Challenges of Standardizing Cloud Computing

What happens when businesses begin outsourcing the technology that has been defined by their processes?
Tags: Cloud, security, standards, cloud computing

RIM Offers Free SMB Server Software

The new software gives smaller businesses smartphone security without paying enterprise-level costs.
Tags: mobile, security, RIM, smartphone, server

Enterprises Support Private Clouds

Enterprises are not ready to tap in to public clouds, but many are experimenting with private cloud computing.
Tags: security, Enterprise, Cloud, private cloud

Mobile Apps Invade the Enterprise

Enterprise-friendly servers and security controls help control third-party mobile apps.
Tags: security, applications, server, Enterprise, mobile

Patch Tuesday will Fix Issues Across all Platforms, Including Servers

Microsoft's Security Bulletin Advance Notification lists major fixes for a number across all Microsoft platforms.
Tags: security, patch, update, Microsoft, server

Oracle Breaks Zero-Day Cycle

Oracle forced to address a critical vulnerability in the WebLogic Node Manager utility after exploit code was released to the public.
Tags: security, exploit, patch, Oracle

Challenges and Security Concerns of Public Clouds

When it comes to the cloud there are obvious benefits and a few challenges too.
Tags: Cloud, network, security, public cloud

Private Cloud, Defined

'Private cloud' is a term heard often these days. What does it actually mean?
Tags: Cloud, cloud computing, security, private cloud

Network Solutions Hit by Limited Web Server Attack

Internet service provider, Network Solutions, recently experienced a limited attack on Web sites hosted on their Unix servers.
Tags: security

2010: The Year of Virtualizing Securely

Virtually Speaking: Two sets of survey results released this week point to security as the next major hurdle for virtualization.
Tags: CDW, security, Symantec, virtualization

Security Issues Temper Virtualization Craze

While 90 percent of enterprises surveyed by CDW have virtualized portions of their datacenters, 62 percent are still keeping "critical" apps on physical servers.
Tags: virtualization, security, datacenter, CDW

Semicolon Bug Reveals IIS Vulnerability

A zero-day vulnerability in IIS revealed on Christmas day allows attackers to bypass file extension protections using a semicolon after an executable extension.
Tags: Microsoft, security, IIS, vulnerability

'Unlucky 13': Symantec's Security Trends for 2010

Hackers and malware purveyors are becoming more sophisticated. Computer users must follow suit by becoming equally wiser and more proactive.
Tags: Symantec, malware, antivirus, antispam, security

Configuring Hyper-V Security Using Authorization Manager

When deploying virtualization technologies, key choices must be made to ensure the environment is secure. This article explains how to use Authorization Manager to make Hyper-V as secure as it can be.
Tags: virtual, operating system, security, Windows Server 2008, Hyper-V

With Superuser Privileges Come Superuser Problems

Superuser privileges bring inherent risks with them, yet you can't run a corporate IT system without granting some people the privileges to do system-level tasks. There are ways, however, to minimize the impact.
Tags: security, superuser

Saving ssh Keys on Mac OS X Leopard

Tip of the Trade: ssh-agent makes it possible to avoid having to type in a passphrase for each login. Helpfully, since the Leopard release on Mac OS X this functionality is built straight in.
Tags: security, Mac OS X, tips, tip of the trade

When Security Is Too Much of a Good Thing

Cover Your Assets: Security is both necessary and good, but can it make your environment less usable? Single sign-on and virtual LANs are two options for securing your internal environment with minimal performance impact.
Tags: security, single sign-on, VLAN, frugality

Opting for Open Source

Cover Your Assets: Open source software is all about freedom, but is the price of freedom too high?
Tags: Linux, open source, frugality, security, virtualization

Microsoft Plugs IIS FTP Hole

A Security Advisory issued late Tuesday from Redmond warns users of a critical zero-day flaw in the FTP capability of older versions IIS Web server software.
Tags: FTP, IIS, web server, zero-day, security

RSA Report Details Potential Virtualization Risks

For a virtual infrastructure to be a success it must be secure. A just-released report from RSA noted that despite the complex security and compliance risks enterprises face when they adopt virtualization, companies that succeed will reap a 'security bonus.'
Tags: EMC, security, RSA, virtualization

Tweet Among Yourselves

If the analysts are to be believed, Twitter is here to stay and will become increasingly pervasive in the months to come. Contrary to popular belief, there is business value in it. Learn how to get the most out of it while avoiding security pitfalls and other headaches.
Tags: Gartner, instant messaging, Twitter, security, social networking

Linux at Risk From NULL Security Flaw

A NULL pointer error has been found in all versions of the Linux kernel released since 2001.
Tags: Linux, security, breaches