Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Virtualization Security Roundup

Posted November 12, 2010    Peter McCalister

There have been some great articles, data, surveys and analyst Virtualization press roundupreports over the last few weeks on virtualization security and I wanted to share and consolidate some of those here.

  • Jon Brodkin of Network World on how “most virtualized workloads are being deployed insecurely” but they don’t have to be. He speaks to hypervisor vulnerabilities and the need for security to play a larger role in the early planning stages.
  • An update from eWeek on the latest PCI compliance rules around virtualization, which has been clarified that servers holding regulated data can be virtualized so long as all the virtual machines on each physical machine serve the same function (ie web server, database, etc.)

Leave a Reply

Additional articles


Closing the Vulnerability Gap

Posted October 7, 2015    Brian Chappell

Managing vulnerabilities is a significant challenge for many organizations. The main difficulties with managing this manifest in two key areas. The first is that the list isn’t static. The second is priority.


Scottrade Breach: Identified by Federal Officials

Posted October 5, 2015    Morey Haber

Late afternoon on October 2nd, news leaked out of another large security breach, now at Scottrade. The identity count of records, in the millions again (4.6 million is the latest). This breach comes on the second day of national CyberSecurity month, the first being Experian/T-Mobile breach.

3d image Data Breach issues concept word cloud background

Experian/T-Mobile Data Breach: When 2 Days is not Enough

Posted October 2, 2015    Morey Haber

On October 1, Experian admitted full responsibility for the loss of T-Mobile customer data. 15 million user records dating back to 2013 were effected in the breach, with data including sensitive information that may be decryptable like social security numbers and drivers licenses.