Interesting posts from McAfee (here) and the Hoff (here)…although we have a long way to go this will be one of the technologies that will push security forward. The ability to run security technologies, independent and abstracted from the OS, or VM image that is loaded and be able to assess and enforce the health and security of non-running VM images and also have capabilities to tie into the NIC for WOL, constraining the end-point and health-checking the loaded VM’s operational agents or configuration state is significant, but with all things it will introduce its own set of new attack methods replacing the ones that are no longer able to exploit the computing environment.
- An error has occurred; the feed is probably down. Try again later.
- Alex Sotirov Amazon Amazon AWS Amazon EC2 anti-virus Apple Azure Barack Obama beyond the perimeter big data BigFix Botnets CA China Chris Hoff citrix cloud computing Conficker cybercrime cyber security Cyber Warfare Data security DDoS Desktop Virtualization DLP DNS EC2 Economics EMC End of the Internet endpoint security facebook FAIL FUD Gartner Google Google App Engine Hadoop Hoff HP IBM IDS Information Security Jacob Appelbaum malware Marketing McAfee Michael Howard Microsoft Microsoft Azure Microsoft Windows mobile computing NAC network security NIST patch management PCI President Obama Quantivo Reuven Cohen Risk RSA SaaS salesforce.com SDL Security social media Swarm Intelligence Symantec systems management twitter VC funding VDI Virtualization VMWare