According to new research from CloudPhysics, 57% of VMware vCenter servers and 58% of VMware ESXi hypervisor hosts haven’t been patched against Heartbleed. VMware issued patches to stop the Open SSL vulnerability back in April and some researchers are concerned with CloudPhysics findings.
Why aren’t data centers with virtual machines patching Heartbleed?
Listen to our latest security slice podcast and hear Craig Young and Lane Thames discuss the challenges connected with patching virtual machines, the costs and perceived benefits of patching and why security hygiene differs in virtual and physical environments.
CLICK HERE TO LISTEN TO THE PODCAST
- Security Slice: Security Up For Ransom
- Security Slice: CISPA 2.0?
- Security Slice: DEF CON Sneak Peek: Pineapple Abductions
- Security Slice: Google’s Project Zero
Check out Tripwire SecureScan™, a free, cloud-based vulnerability management service for up to 100 Internet Protocol (IP) addresses on internal networks. This new tool makes vulnerability management easily accessible to small and medium-sized businesses that may not have the resources for enterprise-grade security technology – and it detects the Heartbleed vulnerability.
The Executive’s Guide to the Top 20 Critical Security Controls
Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].
Title image courtesy of ShutterStock