Virtualization

From servers to storage and networking, virtualization is the technology that drives efficiency and convergence. Go behind the hypervisor hype and discover actionable advice and expertise here.

  • Embracing Cloud Computing

    Webcasts // Jun 2015 // provided by SecurityTube.net

    In this webcast, the presenter will cover how to get over the hump of resistance, do so smartly and possibly enjoy some security benefits in the process. The focus here will be on info sec (or 'Cyber'), rather than the normal DevOps/Agile mumbo jumbo. Vendor selection, indicators of success, net ...

    Watch Now
  • Virtualized Routers Soup to Nuts

    Webcasts // Jun 2015 // provided by SecurityTube.net

    In this webcast, the presenter will demonstrate the virtualization of Cisco routers using the router's .bin file. The virtualization technique is performed using open-source libraries in a VMWare environment. The webcast will be followed by a short discussion of applications of virtualized routers in a cyber-range test environment.

    Watch Now
  • Virtual Android Malware Detection and Analysis (VAMDA)

    Webcasts // Apr 2015 // provided by SecurityTube.net

    Mobile application vetting is pivotal to preserve the integrity of mobile platforms. Existing frameworks typically rely on virtual environments which are easily detected by malware. Advanced malware can avoid detection within existing vetting processes by limiting its functionality within the virtual environment.

    Watch Now
  • A Practical Attack Against Virtual Desktop Infrastructure (VDI) Solutions

    Webcasts // Apr 2015 // provided by SecurityTube.net

    The secure BYOD hype is growing and Virtual Desktop Infrastructure (VDI) is considered the alternative solution for secure containers. In a nutshell, VDI solutions provide a remote workstation offering so that no data is stored locally. The presenters decided to examine the architecture and see for themselves whether VDI delivers ...

    Watch Now
  • Trusting Your Cloud Provider - Protecting Private Virtual Machines

    Webcasts // Feb 2015 // provided by SecurityTube.net

    There are effective measures to protect these data, one of which is encryption. As the user write in CfP 2013: "Uses encryption and access control". Concerning (IaaS) clouds the presenter has data in execution. That is, the virtual image/Virtual Machine (VM) sent to the cloud provider is the secret to ...

    Watch Now
  • A Virtual Scada Laboratory for Cybersecurity Pedagogy and Research

    Webcasts // Feb 2015 // provided by SecurityTube.net

    In this webcast, the presenter will describe a virtual Supervisory Control And Data Acquisition (SCADA) laboratory. This virtual laboratory was built using virtual devices that simulate industrial processes, emulate control system ladder logic functionality, and utilize control system communication protocols.

    Watch Now
  • Tactical Cloudlets: Moving Cloud Computing to the Edge

    Webcasts // Jan 2015 // provided by Carnegie Mellon University

    In this webcast, the presenters will present the tactical cloudlet concept and experimentation results for five different cloudlet provisioning mechanisms. The goal is to demonstrate that cyber-foraging in tactical environments is possible by moving cloud computing concepts and technologies closer to the edge so that tactical cloudlets, even if disconnected ...

    Watch Now
  • Cloud and Virtualization Theory

    Webcasts // Jan 2015 // provided by SecurityTube.net

    Over 20+ years' experience in complex solution development and consulting in IT, cloud, security, telecom and data communications markets. As a result of the presenter experience at VirtuStream, Verizon, Acuative, Tellium and Fore Systems, the presenter have become an expert in understanding how to manage risk and add business value ...

    Watch Now
  • Virtual Machine Introspection: From the Outside Looking In

    Webcasts // Jan 2015 // provided by SecurityTube.net

    New methods and approaches for securing cloud environments are becoming increasingly more critical as traditional host security strategies are not well integrated into virtual environments. For example, antivirus scans are a critical component of layered defense-in-depth, but in the cloud they rapidly exhaust available CPU and memory.

    Watch Now
  • Live Webcast: Top 5 Features of Next-Gen Backup

    Webcasts // Oct 2014 // provided by Veeam Software

    It’s 10 p.m. Do you know where your data is? Backup isn't a simple matter of copying data to an offsite box each night anymore, especially if you're running hundreds of workloads on virtual servers. Do you know which files are located on which media? Can you restore data ...

    Watch Now