Quantcast
Channel: Network and Security Virtualization
Browsing all 481 articles
Browse latest View live

The Relevance of Network Security in an Encrypted World 

Hiding malware in encrypted traffic is a tactic increasingly employed by bad actors to conceal attacks. By one estimate, 60% of cyberattacks carried out in 2019 would leverage encryption, and that was...

View Article


Stop Ransomware with NSX Network Detection and Response 

Back in 2018, some cybersecurity vendors were reporting that cryptomining malware had infected organizations roughly 10 times more than ransomware.  But since then, ransomware has climbed back to the...

View Article


Image may be NSFW.
Clik here to view.

Lateral Movement: What It Is and How to Block It 

In any given attack campaign, bad actors have a specific goal in mind. This goal may involve accessing a developer’s machine and stealing a project’s source code, sifting through a particular...

View Article

Image may be NSFW.
Clik here to view.

Machine Learning, Artificial Intelligence, and How the Two Fit into...

Everywhere I look, someone’s talking about machine learning (ML) or artificial intelligence (AI). These two technologies are shaping important conversations in multiple sectors, especially marketing...

View Article

Detecting Malware Without Feature Engineering Using Deep Learning 

Detecting Malware Without Feature Engineering Using Deep Learning  Nowadays, machine learning is routinely used in the detection of network attacks and the identification of malicious programs. In most...

View Article


Countering the Rise of Adversarial ML 

The security community has found an important application for machine learning (ML) in its ongoing fight against cybercriminals. Many of us are turning to ML-powered security solutions like NSX Network...

View Article

Image may be NSFW.
Clik here to view.

Introducing VMware Transit Connect for networking and security on VMware...

As you migrate and expand your deployments on VMware Cloud on AWS, your network connectivity provides the foundational infrastructure for all workloads in your SDDCs. When you then scale across...

View Article

Simplify your micro-segmentation implementations

Micro–segmentation is a critical component of Zero Trust. But, historically, micro-segmentation has been fraught with operational challenges and limited by platform capabilities.     Not anymore....

View Article


Intrinsic Security: Take security to the next level

The other guys will have you believe that more is better. You have a problem, just buy a solution and patch the hole. Security operations too siloed? Just cobble together some integrations and hope...

View Article


Meet compliance requirements cost-efficiently by implementing East-West...

Compliance is more than a necessary evil. Sure, it’s complex, expensive, and largely driven by manual processes, but it’s also a business enabler. Without the ability to prove compliance, you wouldn’t...

View Article

Closing security gaps and eliminating blind spots in the data center: a...

It’s no secret that traditional firewalls are ill–suited to securing east-west traffic. They’re static, inflexible, and require hair-pinning traffic around the data center. Traditional firewalls have...

View Article

Image may be NSFW.
Clik here to view.

Evolution of Excel 4.0 Macro Weaponization – Continued

Introduction  The evolution of the Excel 4.0 (XL4) macro malware proceeds apace, with new variations and techniques regularly introduced. To understand the threat landscape, the VMware NSBU Threat...

View Article

Image may be NSFW.
Clik here to view.

Trick or Threat: Ryuk Ransomware Targets Health Care Industry

Introduction A recent report [1] from the Cybersecurity and Infrastructure and Security Agency (CISA) has alerted the public about possible forthcoming ransomware attacks that target the health...

View Article


Image may be NSFW.
Clik here to view.

Defeat Emotet Attacks with Behavior-Based Malware Protection

The security community has enjoyed a few months of silence from Emotet, an advanced and evasive malware threat, since February of this year. But the silence was broken in July as the VMware Threat...

View Article

Virtual Patching with VMware NSX Distributed IDS/IPS

Patching: The Perennial Problem   Cybersecurity consumes an ever-increasing amount of our time and budgets, yet gaps remain and are inevitably exploited by bad actors. One of the biggest gaps is...

View Article


Image may be NSFW.
Clik here to view.

The changed and unchanged: COVID-19 Cyberthreats and Malware Updates

By: Jason Zhang, Subrat Sarkar, Stefano Ortolani – VMware Threat Analysis Unit It’s been over three months since our last report on COVID-19-themed attacks.1 During this period, the tragedy of the...

View Article

Mark Your Calendars – The Modern Network for a Future Ready Business

Applications are going through a major transformation – they are becoming more dynamic, complex, and distributed.  They are often built on cloud-native principles and run on-premises and in the cloud....

View Article


Image may be NSFW.
Clik here to view.

Network Automation Can Relieve Network Engineers Stretched Thin by Covid-19

The network has never been more vulnerable. Covid-19 has flung users out from the data center to home offices—where they are accessing critical systems, applications, and other users from unsecured...

View Article

Image may be NSFW.
Clik here to view.

Fault Tolerant Network Design for Application High Availability

Enterprises are growing increasingly dependent on modern distributed applications to innovate and respond quickly to new market challenges.  As applications grow in significance, the end-user...

View Article

Image may be NSFW.
Clik here to view.

The Case for Self-Healing Networks

Digital transformation has changed the way applications are deployed and consumed. The end-user to application journey has become increasingly complex and is a key objective for the Modern Network....

View Article
Browsing all 481 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>