Browsing Posts in vSecurity

Reading Time: 5 minutesAbout Flowmon Flowmon Networks was a global network intelligence company acquired by Kemp in November 2020. The acquisition brings together application delivery and security services with deep network visibility and automated security incident response. One year after (in September 2021), Progress (NASDAQ: PRGS) announced the completion of the acquisition of Kemp and now Flowmon is one of the main company’s product, but still is keeping its own identity and also a dedicated web site (https://www.flowmon.com/en). Why Flowmon? Flowmon offers NetFlow based deep network visibility solution for network and security operations and try to solve one […]

Reading Time: 4 minutesEvolution of the security landscape The digital security landscape has changed faster in the last years and more in the last months with the COVID-19 pandemic. People are working more and more from home with smart working, but not all companies are prepared to secure those access and their digital workspace. The consequence is that there are more attack and threads the are focused on people instead of corporate services or infrastructures. But also, the rising of the cloud services model makes the attack easier and more effective… You can buy them as a service… […]

Reading Time: 2 minutesThere is a big issue in vCenter Server, with sensitive information disclosure vulnerability in the VMware Directory Service (vmdir). Under certain conditions vmdir that ships with VMware vCenter Server, as part of an embedded or external Platform Services Controller (PSC), does not correctly implement access controls.

Reading Time: < 1 minuteThis is an article that I wrote as a contribuitor for the Aruba blog. Read the full article Why Small and Midsize Businesses Need Modern Switches with Strong Security. The network is an important ingredient in any IT security plan, because cyberattacks commonly arrive from the network and attacks also use the network to propagate the damage. Network security is a huge priority for large companies, but it’s equally important for small and midsize businesses (SMBs).

Reading Time: 4 minutesI’m very proud and honored to have been invited at the second Security Field Day (#XFD2) event. This is a brand new Tech Field Day (TFD) event, the Tech Field Day team started the Security Field Day event because they recognized that security is just as vital to IT operations as storage, networking, or virtualization. And of course there is more demand on those type of topics. You can learn more in this post by Tom Hollingsworth: Security Field Day – The Non-Conference.

Reading Time: 4 minutesThe 2018 was the year of the CPU related threats, starting with the Meltdown and Spectre bugs affecting several processors, but with most of issues related to Intel based CPU. Unfortunately, this was only the beginning and many other bugs were discovered later. And we’re probably just at the tip of the iceberg.

Reading Time: 3 minutesThe 140 series of Federal Information Processing Standards (FIPS) are U.S. government computer security standards that specify requirements for cryptography modules. The National Institute of Standards and Technology (NIST) issues the 140 Publication Series to coordinate the requirements and standards for cryptographic modules which include both hardware and software components for use by departments and agencies of the United States federal government. The requirements cover not only the cryptographic modules themselves but also their documentation and (at the highest security level) some aspects of the comments contained in the source code.

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright