Feeds

Watching the security landscape

Stay safe with Vulture Vision

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

RegCast It's a proud day here at El Reg - behold our first live video webcast, now snugly fitted into the archives and available for your delectation. We took an unflinching look into the evolving security landscape, and we'd like to invite you to take a good hard stare too.

Headed up and moderated by our man Tim Phillips, the event examined in-depth the current threats we all face, and the avenues we should consider to help achieve greater levels of protection.

Ensuring Tim wasn't sweating it out in the studio by himself, MessageLabs Chief Security Officer Mark Sunner and Jon Collins from our pals at Freeform Dynamics brought their expert knowledge and advice to the proceedings.

Mark kicked things off with a close look at the significant security threats doing the rounds of late, highlighting where the new holes are opening up in our defences and reminding us of the urgent need to plug them.

Jon Collins followed with some straight-talking advice on mitigating the risks. The event wrapped up in proper fashion with the ever-popular Q&A providing answers to your pressing questions.

For those of you who missed out on this very positively-received event, here's your chance to catch up. Hopefully you'll take something from it, whether it's new ways of improving your own situation, or a little back-up for when you're speaking to the powers that be. Enjoy. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.