From a security perspective, containers are the Wild West – full of exciting possibilities, but also unfamiliar dangers. A study out of Forrester points to this mix of hopes and fears. In the report, ...
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
Cloud computing has revolutionised the delivery of scalable and cost‐effective computational resources, yet this paradigm also introduces unique security challenges. Central to these challenges is the ...
Start-up FireEye made its debut, announcing plans to ship a switch-based network-access control appliance next month that will let customers identify network-borne malware and attacks in order to ...
An important-rated security vulnerability in VMware Tools could pave the way for local privilege escalation (LPE) and complete takeover of virtual machines that house important corporate data, user ...
Back in September, the Center for Internet Security (CIS) released a whitepaper titled "Virtual Machine Security Guidelines - Version 1.0". In it, they addressed security concerns that apply to ...
Recently, I've heard many security officers talking about using virtual machines as a way to increase security. If your developers need local administrator rights and privileges and they can't have ...
Phishing sites are now using JavaScript to evade detection by checking whether a visitor is browsing the site from a virtual machine or headless device. Cybersecurity firms commonly use headless ...
The Windows version of Crisis, a piece of malware discovered in July, is capable of infecting VMware virtual machine images, Windows Mobile devices, and removable USB drives, according to researchers ...
I've been at several recent conferences where virtual machine (VM) and security “experts” were telling audiences how VM technology can be used to improve computer security. Wow! They are either drunk ...