Virtualize Securely - VM Introspection and Automated Security in Action

Johnnie Konstantas

Subscribe to Johnnie Konstantas: eMailAlertsEmail Alerts
Get Johnnie Konstantas: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Johnnie Konstantas

Recently it was discovered that the Zeus botnet was running an unauthorized command and control center on a public cloud computing infrastructure, marking the first time the cloud has been used for this type of illegal activity. It appears that hackers exploited a web server VM, using it as a botnet control point. Fortunately, the Zeus software has been removed, but the potential unfolding of events could have been significantly bad. Imagine, malware compromises a cloud VM. The malware leverages loose security controls to infect other VMs in the cloud. The malware leverages the compromised cloud VMs as a launch-pad for further attacks. And so on. While Conficker and MIT research had provided warning signs of possible security threats to virtual environments and the cloud, the EC2 hack made it a reality. Now that virtualization has hit critical mass, expect more ma... (more)

Burton Group’s Catalyst Conference Proves Aptly Named

These days when cloud security is mentioned, most of us now have come to expect that the topic of data center virtualization, one near and dear to Altor’s heart, is not far behind.  The Burton Group’s annual conference has long been a vastly respected event for its ability to draw top industry minds true to its namesake and catalyze meaningful discussion on emerging technologies and trends. This year’s gathering in San Diego was no different, and while topics ranged from SOA to security, cloud computing and virtualization commandeered much attention in the packed four-day agenda.... (more)

April Cloud Deployments Bring May Flowers

If you’re reading this it’s likely that my mother sent you the link or you are seriously considering a private cloud deployment. Working off the latter, you are understandably worried because Google Alerts is filling your daily inbox with reasons to delay the implementation but operational efficiency trumps punditry so you are putting hand to throat and moving forward nonetheless. This needn’t be the equivalent of Russian roulette with your job. Although standards and reference architectures for cloud computing and security are still evolving, you have a couple of facts in your ... (more)

InterOP NYC: Headlining Was Cloud Computing

Friday October 22nd signified the wrap up of the week-long 2010 Interop New York Conference, which is hosted by UMB TechWeb and takes place annually at the Javits Center. The conference featured keynotes from Cisco and Redhat as well as a massive expo floor with the latest offerings from mainstays like Microsoft and Dell, several start-ups and everyone in-between – over 150 firms in all. But it was cloud computing that took center stage with the conference-within-a-conference – Enterprise Cloud Summit – receiving some of the most attention by attendees and the juiciest of panel d... (more)

We’re Giddy About Duvel, That’s Altor v4.0 To You

By now you’re noticing that there’s something “different” about Altor and no we didn’t get a haircut but we did change our look and feel a bit. Altor’s newest release, codenamed Duvel and now released as v4.0 packs a wallop of new features for security automation and compliance assessment and we felt this was good cause for some serious highlighting – and what better way to do it than the color orange. We hope you enjoy our new site, which is meant to treat you to lots of helpful content including overviews of our newest features and functionality. Not sure where to look first fo... (more)