In organizations that aren’t sophisticated with measuring the value of risk, getting budget for security can be a tough gig. SC Magazine has an entire blog dedicated to an active running list of publicly known breaches, yet no matter how many examples you show, sometimes the logic that it will never be you is just…
I just returned from the Computer Security Institute CSI 2010 conference in National Harbor, Maryland. While there, I spoke on the topic of Logic Bombs using modern examples like Aurora and Stuxnet. This was my first time attending a CSI conference and I must honestly state, I was thoroughly impressed with the quality of the…
A key factor to consider when approaching virtualization security is that the hypervisor is always going to be a high-value target due to its control over the entire virtual environment.