Skip to content ↓ | Skip to navigation ↓

According to new research from CloudPhysics, 57% of VMware vCenter servers and 58% of VMware ESXi hypervisor hosts haven’t been patched against Heartbleed. VMware issued patches to stop the Open SSL vulnerability back in April and some researchers are concerned with CloudPhysics findings.

Why aren’t data centers with virtual machines patching Heartbleed?

Listen to our latest security slice podcast and hear Craig Young and Lane Thames discuss the challenges connected with  patching virtual machines, the costs and perceived benefits of patching  and why security hygiene differs in virtual and physical environments.

 

 CLICK HERE TO LISTEN TO THE PODCAST

 

MORE PODCASTS:

RESOURCES:

picThe Executive’s Guide to the Top 20 Critical Security Controls

Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].

Title image courtesy of ShutterStock