As your software-defined data center (SDDC) grows, so does the quantity of privileged accounts. This was the discussion on the Virtualization Security Podcast of February 13, 2014, where we were joined by Thycotic Software. Privileged accounts are used by administrators and others to fix issues, set up new users, add new workloads, move workloads around …
TVP Category Archives
Application Security: What Is the First Step?
What is the first step of application security? What is this step regardless of whether the process involved is DevOps or traditional silos? We have heard many answers before, such as architecture, code analysis, hardening, risk analysis, etc. But we have not really talked about the intersection of the user, application, data, and system. Perhaps …
Continue reading “Application Security: What Is the First Step?”
Are US Tech Companies Suffering a Slow and Agonizing Death?
Are United States technology companies now suffering from a slow and antagonizing death from what is being called “The Snowden Effect”? The disclosures by the infamous or notorious former National Security Agency that gave a glimpse into the extent of the NSA worldwide spying effort that have prompted companies to avoid and or leave US technology firms in droves.
Adallom: Visibility into Your SaaS Provider Instance
Tal Klein of Adallom joined us on the January 16 Virtualization Security Podcast to discuss Adallom’s approach to logging, auditing, and generally gaining visibility within most SaaS applications. Adallom solves two longstanding problems: how can we as tenants obtain appropriate tenant-only logs of actions within a SaaS application, and how do we determine abnormal behavior …
Continue reading “Adallom: Visibility into Your SaaS Provider Instance”
Privacy and the IoT
Privacy is defined many different ways, but however you define it, when it comes to how corporations use data your privacy becomes very important. What companies do with your data may at times seem like an invasion of your privacy, but in these cases, privacy has well-defined limitations in the eyes of the law. Will …
Something Is Wrong: It Must Be the Hypervisor!
Something is wrong—it must be the hypervisor! If you work in any virtual or cloud environments, how many times have you heard that statement as soon as any kind of problem surfaces? Way back when during the twentieth century, as a problem deflection, the network would immediately be blamed. As we got into the twenty-first century, virtualization …
Continue reading “Something Is Wrong: It Must Be the Hypervisor!”