Phorpiex-Powered BitRansomware Targets APAC Universities
By: Jason Zhang, Stefano Ortolani – VMware Threat Analysis Unit BitRansomware (also known as DCryptSoft or Readme) is a — you guessed it — ransomware program that first surfaced in July 2020. Initially...
View ArticleDeclare Your Application State with Tanzu Service Mesh
YES! You can declare your application resiliency state and keep it like that with a combination of Kubernetes and the new application resiliency capabilities in Tanzu Service Mesh. First things first:...
View ArticleNavigating Supply-Chain Vulnerabilities with a Zero Trust Architecture
In light of the SolarWinds breach, we want to help our customers who may have questions on how a Zero Trust Architecture can act as an effective approach to limit the impact of such attacks. VMware has...
View ArticleProtecting Workloads with Global Network Backing Using Site Recovery Manager
Many thanks to Dimitri Desmidt from VMware, NSBU for providing the Design details of Multi-Location and Federation. Preface Starting NSX-T version 3.0.2 workloads with NSX-T global network backing (L2...
View ArticleIt’s Raining Beacons: Automated Generation of Cobalt Strike Traffic
Introduction Cobalt Strike [1] is a tool to support red teams in attack simulation exercises. To this end, Cobalt Strike provides several techniques that allow a red team to execute targeted attacks to...
View ArticleHow to Build a Better Security Posture Post-Pandemic
What a whirlwind of a year it has been! Covid has accelerated digital transformation — but also made painfully obvious the data center’s continuing security vulnerabilities. We’ll explore VMware’s data...
View ArticleWhat’s the Most Secure Network of Them All?
You’re standing in front of three doors. Door number one is big, tall, and sturdy. Nothing fancy, but seemingly safe. Door number two has more bells and whistles, fancy engravings, and twice the number...
View ArticleFrom Zero Visibility to Zero Trust in the Data Center
Imagine someone breaking into your home. If you catch them in the act, they’re most likely leaving right away, and you’re upping your security system. Now imagine someone breaking into your home, and...
View ArticleExplore Future:NET for a Chance to Win a Bose Headset
Giveaway closed! Hey there, NSXers! The skies are blue, the sun is shining, and summer is in full swing. Whether you’re getting your summer on by grooving to some tunes, or embracing the grind at...
View ArticleWhat’s New in VMware HCX 4.2
Real-time Estimation of vMotion and Replication Assisted vMotion Migration HCX analyzes migration metrics and provides an estimate of the time required to complete the relocation phase of every...
View ArticleIt’s Time to Rethink Security Across the Software Supply Chain
Open Source has proven instrumental in accelerating software development — providing developers with feature velocity, ease of customization, and quality reusable code. However, the open-source...
View ArticleExplore VMware’s Modern App Connectivity Services with Amazon EKS-Anywhere
As enterprises accelerate their application modernization journey, there is a stronger need for running applications across multi-cloud environments. Today, AWS announced General Availability of Amazon...
View ArticleHelloKitty: The Victim’s Perspective
In the past few months, we have witnessed several indiscriminate attacks targeting big companies. Whereas years ago different threat actors focused on specific sectors, nowadays the same techniques,...
View ArticleHow to Simplify Your Journey to Zero Trust with NSX Workshops
At its core, Zero Trust is an operational framework that helps enterprises secure modern network environments. Zero Trust insists organizations strip away ambiguity from their security and focus on the...
View ArticleEnter the NSX Giveaway – Tune In on LinkedIn
Do you remember the 21st night of September? At VMware NSX, we sure do – and you can bet we’ll be dancing to Earth, Wind & Fire all September long. Whether or not this is your September song of...
View ArticleGuide to NSX Security at VMworld 2021
The world is changing and as a result, the ability to operationalize network security at scale is more important than ever. Organizations need the ability to monitor and protect both East-West and...
View ArticleAugmented MISP Integration with NSX Advanced Threat Analyzer
Contributors: Jason Zhang (NSBU TAU), Stefano Ortolani (NSBU TAU) Introduction Formerly known as the Malware Information Sharing Platform, MISP is a leading open-source threat intelligence platform...
View ArticleAll Things Networking at VMworld 2021
Must-See Sessions for Networking This year’s networking sessions – based on the audience feedback from VMworld 2020 – not only feature more customers stories and interviews, but have a balance of...
View ArticleLearn How to Implement Stronger Multi-Cloud Security at VMworld 2021
One of the major focuses at VMworld 2021 is to educate network security teams on how they can achieve the strongest security posture by enabling Zero Trust. The Zero Trust model is essential to...
View ArticleSimplification through Unification: One Network Across the Entire Multi-Cloud
Two major pillars of VMworld 2021 focus on enhancing productivity and consistency. More than ever, businesses are demanding consistent, secure, and reliable communication between apps and users. What...
View Article