Skip to content ↓ | Skip to navigation ↓

According to new research from CloudPhysics, 57% of VMware vCenter servers and 58% of VMware ESXi hypervisor hosts haven’t been patched against Heartbleed. VMware issued patches to stop the Open SSL vulnerability back in April and some researchers are concerned with CloudPhysics findings.

Why aren’t data centers with virtual machines patching Heartbleed?

Listen to our latest security slice podcast and hear Craig Young and Lane Thames discuss the challenges connected with  patching virtual machines, the costs and perceived benefits of patching  and why security hygiene differs in virtual and physical environments.






picCheck out Tripwire SecureScan™, a free, cloud-based vulnerability management service  for up to 100 Internet Protocol (IP) addresses on internal networks. This new tool makes vulnerability management easily accessible to small and medium-sized businesses that may not have the resources for enterprise-grade security technology – and it detects the Heartbleed vulnerability.

picThe Executive’s Guide to the Top 20 Critical Security Controls

Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].

Title image courtesy of ShutterStock

Tripwire University
  • Afzaal

    So according to research statistics, almost 45% of cloud servers are still not patched for Heartbleed bug! This should be on top most priority because of sensitive information of millions of users is at risk.