Virtualize Securely - VM Introspection and Automated Security in Action

Johnnie Konstantas

Subscribe to Johnnie Konstantas: eMailAlertsEmail Alerts
Get Johnnie Konstantas: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories by Johnnie Konstantas

Recently it was discovered that the Zeus botnet was running an unauthorized command and control center on a public cloud computing infrastructure, marking the first time the cloud has been used for this type of illegal activity. It appears that hackers exploited a web server VM, using it as a botnet control point. Fortunately, the Zeus software has been removed, but the potential unfolding of events could have been significantly bad. Imagine, malware compromises a cloud VM. The malware leverages loose security controls to infect other VMs in the cloud. The malware leverages the compromised cloud VMs as a launch-pad for further attacks. And so on. While Conficker and MIT research had provided warning signs of possible security threats to virtual environments and the cloud, the EC2 hack made it a reality. Now that virtualization has hit critical mass, expect more ma... (more)

Burton Group’s Catalyst Conference Proves Aptly Named

These days when cloud security is mentioned, most of us now have come to expect that the topic of data center virtualization, one near and dear to Altor’s heart, is not far behind.  The Burton Group’s annual conference has long been a vastly respected event for its ability to draw top industry minds true to its namesake and catalyze meaningful discussion on emerging technologies and trends. This year’s gathering in San Diego was no different, and while topics ranged from SOA to security, cloud computing and virtualization commandeered much attention in the packed four-day agenda.... (more)

April Cloud Deployments Bring May Flowers

If you’re reading this it’s likely that my mother sent you the link or you are seriously considering a private cloud deployment. Working off the latter, you are understandably worried because Google Alerts is filling your daily inbox with reasons to delay the implementation but operational efficiency trumps punditry so you are putting hand to throat and moving forward nonetheless. This needn’t be the equivalent of Russian roulette with your job. Although standards and reference architectures for cloud computing and security are still evolving, you have a couple of facts in your ... (more)

InterOP NYC: Headlining Was Cloud Computing

Friday October 22nd signified the wrap up of the week-long 2010 Interop New York Conference, which is hosted by UMB TechWeb and takes place annually at the Javits Center. The conference featured keynotes from Cisco and Redhat as well as a massive expo floor with the latest offerings from mainstays like Microsoft and Dell, several start-ups and everyone in-between – over 150 firms in all. But it was cloud computing that took center stage with the conference-within-a-conference – Enterprise Cloud Summit – receiving some of the most attention by attendees and the juiciest of panel d... (more)

The Road to SDN Is Paved with Visibility By @JKonstantas | @CloudExpo #SDN #Cloud

Network architectures are in the midst of a massive transformation. Not too long ago, traditional network designs began to strain under increased demand for compute and storage. This saw the advent of server and storage virtualization, giving organizations on-demand access to the resources required for supporting service-oriented architectures and machine-to-machine communications. The increased agility and provisioning of virtualization showed the immense flexibility of decoupling key network components from the underlying hardware and catalyzed what is now a movement toward sof... (more)