Virtualization Security

Virtualization Security focuses upon end-to-end security, integrity, auditability, and regulatory compliance for virtualization and clouds. Virtualization Security starts where the cloud and virtual environments begin: the end user computing device.|We follow the user through the virtual and cloud stacks until they reach the application the user wishes to use to retrieve the data that is important to them. Virtualization and cloud security is implemented where there is an intersection between user, data, and application while maintain strict control of management interfaces. As such virtualization security looks into all aspects of security devices, tools, controls, and guides that impact or can be used to secure virtual and cloud environments.

Most Recently added Virtualization Security Resources: (See More...)

Security is not compliance and compliance will not get you security. Or does it?

April 3, 2013
By
VirtualizationSecurity

Security is not compliance and compliance will not get you security. At least that is what I hear from security teams. Conversations with security focal team members from non-security focal people can be quite interesting and has its unique challenges and hurtles to overcome. You can find yourself speaking the same language but not fully…

Read more »

Training and More Training for EUC Security

April 2, 2013
By
VirtualizationSecurity

End User Computing security seems to be in the hands of the users not actually the IT Security department. At least not yet. So what can we do about this? IT security can be draconian and not allow EUC devices into the office, but the users will be up in arms. They use their smart…

Read more »

The Growing Divide between Security and Virtualization (Cloud)

March 29, 2013
By
VirtualizationSecurity

I asked @MrsYisWhy to join the podcast as she is from the other side of the world from virtualization and cloud security folks and has quite a different view. The rent we saw being sewn up is now a vast divide as we jump feet first into Cloud deployments, virtualization business critical workloads, and generally…

Read more »

News: Public Comment for VMware Hardening Guide

March 28, 2013
By
VirtualizationSecurity

Just entered my mailbox, there is a new rev of the vSphere 5.1 hardening guide which was spoken about on the last Virtualization Security Podcast. This version of the hardening guide creates a much needed new feature: Profiles.

Read more »

VMware Fleshes Out SDN Strategy with NSX

March 14, 2013
By
VMware100x30

VMware has added some significant meat to the bones of its Software Defined Data Center Strategy with the announcement of the VMware NSX Network Virtualization Platform. NSX represents the combination of the previous VMware network virtualization technology (VXLAN) with the technology that came from the acquisition of Nicira.

Read more »

Cloud Conversations: Tweetchat and Serendipity

March 13, 2013
By
VirtualizationSecurity

The 3/7 Virtualization Security Podcast featured Andi Mann, VP of Strategic Solutions at CA Technologies, and RSA Conference. The conversation was lively and I invited Andi Mann due to a previous day tweet chat about cloud security. Lately I have had several serendipitous conversations on cloud security from TweetChat, to in face discussions with @Qthrul,…

Read more »

Public Cloud Reality: Reinforced at CSA Summit

March 5, 2013
By
CloudComputing

I have written about the Public Cloud Reality and the need to bring your own security, monitoring, support. This was reinforced by Dave Asprey of Trend Micro at the last Cloud Security Alliance Summit held at this years RSA Conference. The gist of Dave Asprey's talk was that YOU are responsible for the security of…

Read more »

RSA Conference: What was Interesting

March 4, 2013
By
RSA Conference: What was Interesting

As I met with people at RSA Conference last week, the common question was: What was interesting and new? My view was from the world of virtualization and cloud security, which often differs from general or mobile security. This show was more about general and mobile security than it was about virtualization and cloud security…

Read more »

News: Sky High Networks provides Cloud Service Security Ratings

February 28, 2013
By
CloudComputing

There has been a dearth of intelligence reporting on cloud services and up until now we had to rely upon the Verizon Breach Report, Alert Logic's State of the Cloud report, the Enisa and other reports, but even so there was nothing specifically about a given cloud service outside the lightly used Cloud Security Alliances…

Read more »

Featured Solutions