Posts Tagged ‘ Texiwill ’

Backup Security

January 14, 2010
By
Backup Security

When you think of backup security, many people think of ensuring tapes are offsite or even encryption on media, but what is really required for backup security? There is quite a bit going on when someone performs a backup within the virtual environment, so where does security begin and end for making a single or…

Read more »

Does Virtualization Security take a New Way of Thinking?

December 17, 2009
By

I recently participated in the InformationWeek Dark Security Virtual Event as a panel member with Hoff, Craig Balding, Chris Wolf, Glenn Brunette, and Jon Oberheide. A very far ranging group of individuals from research, security organizations, analysts, and authors. What is interesting is that most of these same people have joined me on the Virtualization…

Read more »

PCI discussed on the Virtualization Security Podcast

December 16, 2009
By

The last Virtualization Security Podcast covered PCI, Kurt Roemer and Jeff Elliot who were guests represented PCI.  PCI as you hopefully know is working on compliance guidance for payment systems running within virtual machines and the cloud. This early discussion is a plea for people to get involved in reviewing the currently developing white-paper. While…

Read more »

VLANs/FCoE/CNA – Mixed Security Data on One Wire

December 2, 2009
By

Over the past year or so I have been thinking pretty heavily about the direction networking is taking within virtualization. In some ways, it appears security has been forgotten or relegated to 'encrypt' and forget. However, it takes quite a bit of knowledge and time to properly set up the backbone of an 'encrypt' and…

Read more »

NIST Cloud Computing Definitions Final

November 25, 2009
By

There has been great debate of what comprises the cloud, how to bound the cloud so that its easier to understand, and how to secure the cloud. Christofer Hoff of the Rational Survivabilty blog has been spear-heading quite a bit of discussion on cloud taxonomy in his attempts to wrap some thoughts around how to…

Read more »

Intrusion Protection and Detection within the Virtual Environment

November 18, 2009
By

Intrusion Protection Systems (IPS) differ quite a bit from Intrusion Detection Systems (IDS). An IPS is designed to modify some form of security setting when an intrusion is detected, thereby preventing the intrusion from being successful. An IDS on the other hand is just the detection component used by an IPS. Like all security tools…

Read more »

Is there a Cloud over a set of Islands?

November 13, 2009
By

I was recently on an island and it got me thinking about whether a set of close islands can support a highly mobile cloud? If not what would be needed to make the Islands Cloud safer from the vagaries of Mother Nature, such as hurricanes, volcanoes, and earthquakes. Can a cloud provider be based on…

Read more »

Upgrades to VMware vSphere will Impact Availability and Security!

November 5, 2009
By

I was upgrading my nodes from VMware VI3 to VMware vSphere and used the VMware Update Manager to perform the update. Given that my existing filesystems were implemented to meet the requirements of the DISA STIG for ESX, as well as availability. I was surprised to find that when the upgrade of the first node…

Read more »

Virtualizing from an Island?

October 30, 2009
By

I was recently on an island and it got me thinking of how would I move my company to the island. The company services people around the world, but would also service local to the island. Does virtualization really help me here? Why do I ask this, because an island is often prone to the…

Read more »

Featured Solutions