security Tag Index

The CoreOS Science of Securing Container Infrastructure

Alex Polvi has a history of casting aspersions on the security of the Docker container ecosystem, and now his company is taking a giant step towards making container infrastructure more secure.

Tags: Open Container Initiative, Google Kubernetes, containerization, Kubernetes, virtualized infrastructure, docker, CoreOS, container security, virtually speaking, containers, security, Docker Containers, CoreOS Rocket, CoreOS Linux

Red Hat Enterprise Linux 7.2 Adds Security, DR Features

This year's second major milestone release of the leading Linux operating system platform provides new security features as well as improved disaster recovery.

Tags: Red Hat Enterprise Linux 7.2, open source, Fedora Linux, Red Hat, enterprise linux, security, disaster recovery, DNS security

When Virtualized Infrastructure Comes at an Added Cost

While server virtualization certainly offers many great benefits, when it comes to security there are potentially expensive drawbacks to consider.

Tags: server virtualization, VMware, Docker Containers, containers, virtualization, containerization, virtually speaking, container security, virtualized infrastructure, security

Windows Server 2003 Meets the Zombie Apocalypse

Don’t create zombie Windows Server 2003 systems. Running a server with the out-of-support operating system can attract hackers and land small businesses in legal hot water.

Tags: Windows Server 2003, security

Say Good-Bye to Windows Server 2003

Time is running out. This summer, Microsoft will close the book the Windows Server 2003. Start planning a replacement strategy today to keep your business data safe and secure.

Tags: security, Windows Server 2003, small business

Red Hat Enterprise Linux 6.5 Delivers Precision Timing

Red Hat's new enterprise Linux release debuts with new security, virtualization and time-keeping features.

Tags: Enterprise, Red Hat, virtualization, Linux, precision timing, Network Timing Protocol, Precision Timing Protocol, RHEL 6.5, security

AMD Gets Cozy with ARM for Hybrid Chips, Security

Can the embattled chipmaker best Intel by teaming with ARM, the mobile processor king?

Tags: ARM, security, ARM server, AMD, AMD fusion

Securing a VNC Server on Linux with SSH

Virtual Network Computing (VNC) enables you to use a GUI instead of a command-line interface when remotely connecting to a Linux or Unix machine, but security's another matter entirely.  Discover how to make sure your VNC server connections stay secure.

Tags: tutorials, tutorial, Linux, vnc, Linux server, security, SSH, server tutorial

VMware Source Code Leak Reveals Virtualization Security Concerns

Was VMware's recent security breach a bombshell or something barely worth raising an eyebrow about?  A security expert weighs in.

Tags: virtualization, server virtualization, VMware, Security Breaches, security

Intel Accelerates Servers with Xeon E5 Chip Launch

Latest Intel server chip release delivers new I/O, security and performance gains.

Tags: Xeon, xeon e5, security, I/O, Intel

Kaspersky Previews Anti-malware for VMware Environments

Security software provider secures virtual machines running Windows and hints at markets beyond VMware.

Tags: VM, VMware, security, Kaspersky, Kaspersky Labs, virtual machine

4 Mobile Management Solutions to Keep Your Enterprise Secure and in Sync

As mobile devices in the enterprise grow by leaps and bounds, enterprises' ability to remotely manage them, including enforcing security policies and keeping data in sync, becomes ever more important. Here are four solutions to help resolve this growing data center dilemma.

Tags: Zimbra, email, mobile, mobile device management, mobile device, security, open source software

Why the Ideal Virtual Infrastructure Is 'Boring Business as Usual'

Adopting virtualization technology  often leads companies to carry out security, backup and other day-to-day activities in new and different ways. This often adds unnecessary costs and complexity. Symantec's solution? Keep it simple.

Tags: Storage, server virtualization, Symantec, cloud computing, security

Kemp Adds Pre-Configured Templates to Load Balancer Firmware

Seeking to reduce the time required to deploy load balancing for enterprise applications, Kemp Technologies has updated its LoadMaster firmware to support pre-configured application templates.

Tags: template, load balancing, security, Kemp Technologies

Kernel Developers Share Security Tips

Learn tips for keeping your Linux system safe in this post-kernel.org-breach world.

Tags: SSH, Linux security, tip of the trade, Kernel.org, security

10 Secure Linux Distributions You Need To Know About

If security is a primary concern for you (it should be), introduce yourself to 10 secure Linux distributions ready to work in any environment from small to enterprise to cloud.

Tags: security, distribution, Linux, Linux distribution, open source

Check WordPress for Exploits

WordPress is one of the most popular CMSes, which means it is among the more commonly exploited. Use the Exploit Scanner plugin to help lock it down.
Tags: Wordpress, exploits, plugin, security, tip of the trade

Apache Updates HTTP Web Server for Security and the Future

Apache updates the world's most popular web server with a security update and a beta for the next generation of HTTP.
Tags: web server, Apache, open source software, HTTP, security

DenyHosts: Keep on Knocking but You Can't Come In

DenyHosts makes it easy to ward off unauthorized SSH connection attempts. The utility blocks attempts to connect to your server via SSH after too many failed attempts or from a blacklisted host.
Tags: open source software, security, SSH, tip of the trade

Discover Rootkits With Unhide

When your system is rooted, you can't trust most utilities to show processes from the rootkit. To identify the problem, check out unhide and unhide.rb.
Tags: open source tool, open source software, rootkit, security, tip of the trade

Making Your Virtual Security Real

When it comes to beefing up the security of your virtualized IT environment, to whom are you going to turn?
Tags: virtualization technology, server virtualization, security, Security Advisory, hypervisor

Security: The Biggest Holdup to Cloud Computing

A lack of understanding of security risks is one of the key factors hampering cloud computing adoption. Find out the five most overlooked threats to the technology.
Tags: cloud security, virtualization, hypervisor, security, cloud computing

4 Easy Steps to Securing Your Servers in the Public Cloud

When it comes to security in the public cloud, you're on your own. Your cloud provider will not help protect your systems from hackers and other attacks beyond protecting its own infrastructure. However, with due diligence you can minimize your risks.
Tags: server security, public cloud, security

10 Workloads That Should Never Go in a Public Cloud

Security is the primary reason you should never consider deploying any these 10 workloads to a public cloud.
Tags: security, customer relationship management, deployment, public cloud, cloud computing

Generate Secure Passwords With Pwgen

Coming up with good passwords is never easy. Enter Pwgen, a utility that generates random (but pronounceable) passwords.
Tags: password, tip of the trade, security, Security practices, Linux

More Yum Plugins: Security and Package Priority

Yum Plugins make it easy to extend the open source tool's functionality. The security plugin and the priorities plugins are a great place to start.
Tags: open source tool, open source software, open source, tip of the trade, security

The 5 People You Meet in the Data Center

Whether you're a sys admin who needs physical access to a server in the data center or a business owner moving your data center to the cloud, it is important to meet the people who support and maintain your data center.
Tags: data center management, data center facilities management, security, staffing, system administrator

Use Virtual 8086 Mode to Secure Virtual Servers

'Security through virtualization' is a strategy that's bound to fail. So how do you protect your virtual machines? By testing virtualization systems methodically. One way to accomplish this is to break virtualization by switching to virtual 8086 mode.
Tags: virtual server, server virtualization, security, 8086 mode, Virtual Server Security

Windows Server Security Best Practices

When it comes to Windows server security, it's all about reaction time.
Tags: OS, Windows Server security, Windows Server, security, security best practices

Open Source Windows SSH Client Delivers Security Boost

The Windows SSH client, PuTTY, is incredibly useful and becomes even more so when set up with a private/public keypair.
Tags: Windows, security, SSH, tip of the trade, open source software

Scaling the Security Chasm

It takes more than mere compliance to keep your organization truly secure.
Tags: viruses, compliance, security, customer data, password

Server Virtualization Presents New Security Concerns

Firewalls and intrusion prevention systems (IPS) may not be enough to defend against malicious hypervisors.
Tags: virtualization, server security, server virtualization, security

3 Ways to Secure Your Virtualized Data Center

Server virtualization may have caught on far and wide, but the technology for securing virtual environments lags. Regaining visibility at the access layer is critical to keeping your data safe. Here are three ways to accomplish this.
Tags: data center, virtual server, virtual machine, security, server virtualization

'Secure OS': The Latest IT Oxymoron

The latest security research from Secunia shows security vulnerabilities among the major vendors increasing as much as fourfold in the past four years. Apple may think it stands apart, but its record is spotty, and with iPhone jailbreaks now 'legal,' its security woes may only be beginning.
Tags: iPhone, security, jailbreak, Apple, security vulnerabilities

CA Debuts 5 Virtualization Management Apps

Five new virtualization applications are designed to simplify life for IT managers and ease the complexity of moving virtual data loads throughout the organization.
Tags: software, management, virtualization, security, CA

Cloud Computing With Less Security Risk

Are security issues holding your company back from deploying cloud computing? Asking key questions and trusting your intuition goes a long way in reducing the likelihood of security issues cropping up.
Tags: security, cloud computing, cloud security

Improve IT Security With Server Virtualization

New virtual and appliance offerings from Core Security aim to improve businesses' security by automating testing -- helping IT admins gather more 'Insight' into what's at risk.
Tags: server virtualization, Core Security, penetration testing, security

Trend Micro Secures Enterprise Virtualization Technologies

Trend Micro's virtualization technologies offer security for virtual environments.
Tags: VDI, secure virtual enviornment, security, virtualization technologies

Medusa: Open Source Software 'Login Brute-Forcer' for Password Auditing

By now, it's practically canon that bad passwords can have catastrophic consequences. What can a security admin do to ensure users are doing their part for server security? Enter Medusa, an open source software password auditing tool for Linux that will put all of your organization's passwords to the test.
Tags: security, medusa, open source software, security audit

Symantec's Free DNS Service Blocks Malware

The free DNS service uses a special name server to block known malware and phishing websites.
Tags: Symantec, malware, security, server tool, DNS service

New Tool Addresses JBoss Server Security

The upcoming AthCon conference will highlight the security risks facing JBoss server admins.
Tags: server, JBoss, security

Citrix, McAfee Make Virtual Desktop Security Simpler

The companies have announced a partnership to make virtual desktop security simpler for large enterprise deployments.
Tags: McAfee, security, virtual desktop, Citrix

Server Security: The Threat from Within

You've built a virtual fortress to keep strangers off of your servers and out of your data center, but did you know your greatest enemy is more likely to be one of your own employees?
Tags: server security, cyber security, security, data center security

Gartner Says 60 Percent of Virtualized Servers Will Be Less Secure Than the Physical Servers They Replace Through 2012

Gartner Outlines Six Most Common Virtualization Security Risks and How to Combat Them
Tags: virtualization, security, server, VMware

WatchGuard Announces Quarantine Management Server

WatchGuard offers businesses protection against spam, phishing and malware-laden messages.
Tags: spam, server, security, appliance, malware

VirusBarrier Server Has New Defense Update

VirusBarrier Server 3 runs on 64-bit code and includes a number of new security features.
Tags: malware, server, virus, security, Mac OS X

Testing Enterprise Public Clouds

The benefits of public clouds are obvious, but what about the pitfalls?
Tags: server, public cloud, security, Enterprise, Cloud

Mac OS X 10.6.3 Client and Server Versions

The 10.6.3 Snow Leopard update includes bug fixes, improvements, and security fixes.
Tags: Exchange, snow leopard, security, server, Mac OS

Server Virtualization Security Issues

There are a number of security issues to consider when planning and deploying server virtualization.
Tags: VMM, security, ESX Server, virtualization technologies, virtual server

Jumping on the Cloud? Consider these Security Issues

A little planning and preparation can help you avoid a potential cloud nightmare.
Tags: cloud computing, public cloud, cloud service, security, Cloud server

Secure Server Virtualization Using Hyper-V

Authorization Manger makes secure server virtualization more than a pipe dream. These best practices show you the two best ways to secure Hyper-V Server and virtual machines using Authorization Manager.
Tags: Hyper-V, server virtualization, virtual, Microsoft, security

Apache Web Server Flaws Patched

A handful of vulnerabilities in Apache Web server get fixed, including one flaw that impacts only Windows systems.
Tags: patches, apache web server, Apache, httpd, security

Data Center Jobs in Demand: IT Security

When it comes to data center jobs, IT security is the place to be. Salaries are on the rise as demand for security pros grows.
Tags: survey, salaries, security, IT

VMware, RSA, Intel Join Forces to Secure Cloud Computing Environment

Virtually Speaking: VMware, Intel and RSA have partnered to make cloud computing more secure, for the private cloud. Will anyone care?
Tags: security, private cloud, RSA, Intel, VMware

Qualys Offers Free Web Server Scanning

QualysGuard Malware Detection allows Web server administrators to perform automatic scans of external-facing Web servers.
Tags: security, service, web server, scanning, malware

GlobalSCAPE Adds Enhanced File Transfer to Enterprise MFT Solution

GlobalSCAPE, Inc. has announced enhancements to its enterprise MFT solution, and a new customer deployment at AMD.
Tags: globalscape, EFT, Enhanced File Transfer Server, security, MFT

Keeping the Zeus Botnet Out of Your Enterprise

Zeus is old, but the more than 70,000 unique variants is still good at stealing credentials.
Tags: Enterprise, security, botnet, Zeus, SSL

Using Access Controls on Windows Server 2008

Configuring Windows Server 2008 features will improve authentication and access control in your network.
Tags: access controls, configurations, authentication, Windows Server 2008, security

The Challenges of Standardizing Cloud Computing

What happens when businesses begin outsourcing the technology that has been defined by their processes?
Tags: Cloud, security, standards, cloud computing

RIM Offers Free SMB Server Software

The new software gives smaller businesses smartphone security without paying enterprise-level costs.
Tags: security, smartphone, server, mobile, RIM

Enterprises Support Private Clouds

Enterprises are not ready to tap in to public clouds, but many are experimenting with private cloud computing.
Tags: security, Enterprise, Cloud, private cloud

Mobile Apps Invade the Enterprise

Enterprise-friendly servers and security controls help control third-party mobile apps.
Tags: security, applications, server, Enterprise, mobile

Patch Tuesday will Fix Issues Across all Platforms, Including Servers

Microsoft's Security Bulletin Advance Notification lists major fixes for a number across all Microsoft platforms.
Tags: patch, Microsoft, server, security, update

Oracle Breaks Zero-Day Cycle

Oracle forced to address a critical vulnerability in the WebLogic Node Manager utility after exploit code was released to the public.
Tags: patch, Oracle, exploit, security

Challenges and Security Concerns of Public Clouds

When it comes to the cloud there are obvious benefits and a few challenges too.
Tags: network, security, public cloud, Cloud

Private Cloud, Defined

'Private cloud' is a term heard often these days. What does it actually mean?
Tags: Cloud, cloud computing, security, private cloud

Network Solutions Hit by Limited Web Server Attack

Internet service provider, Network Solutions, recently experienced a limited attack on Web sites hosted on their Unix servers.
Tags: security

2010: The Year of Virtualizing Securely

Virtually Speaking: Two sets of survey results released this week point to security as the next major hurdle for virtualization.
Tags: CDW, Symantec, virtualization, security

Security Issues Temper Virtualization Craze

While 90 percent of enterprises surveyed by CDW have virtualized portions of their datacenters, 62 percent are still keeping "critical" apps on physical servers.
Tags: virtualization, security, datacenter, CDW

Semicolon Bug Reveals IIS Vulnerability

A zero-day vulnerability in IIS revealed on Christmas day allows attackers to bypass file extension protections using a semicolon after an executable extension.
Tags: Microsoft, security, IIS, vulnerability

'Unlucky 13': Symantec's Security Trends for 2010

Hackers and malware purveyors are becoming more sophisticated. Computer users must follow suit by becoming equally wiser and more proactive.
Tags: Symantec, malware, antivirus, antispam, security

Configuring Hyper-V Security Using Authorization Manager

When deploying virtualization technologies, key choices must be made to ensure the environment is secure. This article explains how to use Authorization Manager to make Hyper-V as secure as it can be.
Tags: virtual, operating system, security, Windows Server 2008, Hyper-V

With Superuser Privileges Come Superuser Problems

Superuser privileges bring inherent risks with them, yet you can't run a corporate IT system without granting some people the privileges to do system-level tasks. There are ways, however, to minimize the impact.
Tags: security, superuser

Saving ssh Keys on Mac OS X Leopard

Tip of the Trade: ssh-agent makes it possible to avoid having to type in a passphrase for each login. Helpfully, since the Leopard release on Mac OS X this functionality is built straight in.
Tags: tips, tip of the trade, security, Mac OS X

When Security Is Too Much of a Good Thing

Cover Your Assets: Security is both necessary and good, but can it make your environment less usable? Single sign-on and virtual LANs are two options for securing your internal environment with minimal performance impact.
Tags: single sign-on, frugality, security, VLAN

Thanks for your registration, follow us on our social networks to keep up-to-date