Network Computing is part of the Informa Tech Division of Informa PLC
'Virtual' Vulnerabilities About to Become Reality
By Kelly Jackson Higgins
Senior Editor, Dark Reading
Hypervisors gone bad. Malware spreading from one virtual machine to another. Virtualization-based rootkits evading detection. Such threats look scary on a PowerPoint slide, but are they worth losing sleep over tonight?
Probably not, experts say. Virtualization is still in its early stages of deployment, so most security threats to virtualized environments are either too futuristic or theoretical for most enterprises to digest. Few virtualization vulnerabilities have been disclosed publicly.
But that doesn't mean you won't lose some sleep down the road, security experts say. (See VMs Create Potential Risks.)
Recommended For You
What skills do network managers really need to properly secure industrial networks? What new protocols, frameworks, and regulations are important? And what conferences and certifications can help? Here are five tips to get started.
A full-stack approach to retail edge offers retailers a way to optimize operations and adapt to changes in a post-pandemic world.
Network management tool sprawl is getting in the way of network management. It’s time for IT to do something about it.