How to Secure the Software Supply Chain with Container Network Security
The way enterprises design, build and run applications has changed significantly over the past several years with the evolution of microservices and containers. No longer are applications built using a...
View ArticleWhen Supply-Chain Attacks Meet CI/CD Infrastructures
Supply-chain attacks can be so destructive that they are often considered black-swan events. Often, the most upsetting aspect of the attack is that it manages to compromise what is normally deemed to...
View ArticleHow to Get the Most Out of VMware NSX with Advanced Load Balancing
Switzerland never takes sides. Safeguarding its independence is one of the principal objectives of Swiss foreign policy. And Swiss neutrality, one of the main principles of this policy, dictates that...
View ArticleNSX Year in Review: 2021
With 2022 just around the corner, we can’t help but look back at the past year. 2021 was one for the books, as the world continued to navigate the ups and downs of the pandemic and the new way of...
View ArticleAnnouncing VMware HCX 4.3
VMware HCX, an application mobility platform, is a crucial part of an organization’s digital transformation journey. HCX simplifies application migration, workload rebalancing, and business continuity...
View ArticleSimplify NSX Security for Brownfield vSphere Deployments with NSX-T 3.2
Perimeter-only security controls are just not sufficient to address sophisticated attacks on mission-critical infrastructure. VMware NSX pioneered the “micro-segmentation” approach, in which granular...
View ArticleIntroducing DARTH: Distributed Analysis for Research and Threat Hunting
As targeting data centers, which mainly run workloads on Linux, has proven to be a very lucrative target for cyber criminals, Linux malware has become increasingly prevalent. Although still an emerging...
View ArticleHow to Achieve TAP-less Network Traffic Analysis
We’re all becoming extremely aware of the importance of east-west protection. Recent security breaches have highlighted the role of Zero Trust as an essential strategy to protect valuable information....
View ArticleHow VMware Protects Organizations with Simply Stronger Security [INFOGRAPHIC]
Every 11 seconds, a new organization falls victim to ransomware. That means by the time you’re done reading these two sentences, your organization could very well become another statistic. In the war...
View ArticleBetter Together: Self-Service and Decision Automation for NSX-T 3.2
You Wouldn’t Try to Combine Self-Driving Technology and a Manual Shift Car Many people see Tesla as the future of driving. Tesla cars come standard with software-enabled autopilot features and full...
View Article6 East-West Security Myths Busted
With the world at our fingertips via a simple Google search, it can sometimes be tough to figure out what’s fact and what’s fiction. Whether you’re an expert, novice, or beginner in the tech world,...
View ArticleVMware Network Automation with NSX-T 3.2 and vRealize Automation
VMware Network Automation combines the modern microservices architecture of vRealize with VMware NSX network virtualization to enable rapid application rollout. The solution automates VMware NSX via...
View ArticleEmotet Is Not Dead (Yet)
The state of cyber security is a typical example of a cat-and-mouse game between hackers and defenders. Sometimes, a threat that appears to be under control, if not completely mitigated, comes back...
View ArticleIntroducing New NSX Upgrade Capabilities for NSX-T 3.2
We’re introducing new capabilities to help our customers prepare for upgrading to the latest releases — now available with NSX-T Data Center 3.2.0.1. To ensure that existing NSX deployments can be...
View ArticleNSX-T 3.2 Introduces Migration Coordinator’s User Defined Topology Mode
VMware NSX-T 3.2 is one of our largest releases — and it’s packed full of innovative features that address multi-cloud security, scale-out networking, and simplified operations. Check out the release...
View ArticleEmotet Is Not Dead (Yet) – Part 2
Emotet attacks leveraging malicious macros embedded in Excel files continue, with new variants and novel tactics, techniques, and procedures (TTPs). Following our recent report, we observed new waves...
View ArticleThreat Landscape Report – Malware in Linux-Based Multi-Cloud Environments
Ransomware-as-a-service has become an increasingly more visible threat to organizations, and we continue to see sophisticated ransomware attacks across multi-cloud environments. A new VMware Threat...
View ArticleLearn About the Threats Lurking in Your Linux-Based Multi-Cloud
78% of the most popular websites are powered by Linux, which means malware targeting Linux-based operating systems are attacking multi-cloud environments at an alarming rate. Threats such as...
View ArticleConnect and Secure your Apps with Antrea and VMware NSX-T 3.2
The release of VMware NSX-T 3.2 and VMware Container Networking with Antrea 1.3.1-1.2.3 delivers on VMware’s vision to have heterogeneous Antrea clusters running anywhere integrate with NSX-T for...
View ArticleThe 7 Requirements of Highly Effective Load Balancers
As Stephen R. Covey stated in his popular book, The 7 Habits of Highly Effective People, “True effectiveness requires balance.” VMware agrees. And when it comes to accelerating modern application...
View Article