cloud security Archives - HyTrust
https://www.hytrust.com/uploads/layer-10.jpg

cloud security

The Three Categories of Container Security

Overview When it comes to securing containers one has to consider a holistic approach. Besides the security and integrity of the images one needs to ensure the container infrastructure i.e the container management system such as Kubernetes orchestrator and the virtual machines or hosts where the orchestrator is running are properly secured. Even though the […]

Think You Checked the Encryption Box with SEDs? Think Again!

In case you missed it, last week a team of researchers from Radboud University in the Netherlands discovered a serious flaw in self-encrypting drives (SEDs). Luckily, it only affects drives from two manufacturers, Crucial and Samsung.  They accomplished this task spending less than 100 Euros, by reverse engineering the firmware of the drives.  You can […]

Avoid Becoming the Next Data Breach Victim

In the last year, some of the biggest companies in the world were plagued by equally massive data breaches – making it clear that organizations and IT teams of all sizes are in need of security reform. Only by implementing stronger security measures and policies can organizations prevent devastating security events from continuing to take […]

Four Data Crimes You Don’t Need to Commit

Picture a crime scene after a break-in. The images in your mind might include broken windows, shattered glass and signs of a struggle. Does that vision change if you learn the break-in took place virtually, affecting the contents of a data center – instead of a home? When a data breach occurs, there’s no physical […]

It’s Virtually Impossible to Write a $100 Check

Stop and think what it takes at your company for someone to write a $100 check from the company checkbook. It doesn’t seem like a lot but there are controls in place to make sure that it is not easy to write that $100 check, controls meant to protect the company from fraud, theft and […]

Virtualized Infrastructure Protection: “Last Mile”

Protecting the “Last Mile” of Virtualized Infrastructure The telecommunications network operators refer to the final leg of the connection to end-users as the “last mile”. While fiber may run close by, completing that last mile has been a challenge and elusive. The same can be said for organizations leveraging virtualization. Those “last mile” goals, or […]

Protecting Your Hypervisor: When the Enemy Breaks Through the Line, Command and Control Is the New Soft Underbelly

The foundation of modern day cloud security completely depends on the security of your hypervisor. It’s the hypervisor that controls and coordinates the functioning of virtual machines running on a server. With the shift to virtualization, the hypervisor becomes your most vulnerable point. In order to increase efficiency, organizations are condensing multiple virtual machines into […]

Continuous Monitoring Offers Sustainable Compliance

Verizon’s 2015 PCI report is out, offering some reassurance to those worried about the state of security in point of sale systems. But compliance rates continue to be low. The report notes that the number of organizations meeting full compliance nearly doubled from 2013. But only about a quarter of those organizations managed to remain […]

Addressing IT’s Biggest Security Concerns

Security has become the biggest worry the IT world faces. With a growing number of high-profile breaches and no end in sight, we thought it wise to examine the security issues that concern IT professionals most, ensuring our products are still addressing the security and compliance needs of businesses using virtual systems.

We have placed cookies on your device to help make this website better. By continuing to use this website you agree to our Cookie Policy.