Security in the virtual world. It's impressive as people abandon concepts due to simple "name changes"... I'm referring here to network and system admins that stop deploying some traditional control measures as network segregation, traffic monitoring, security zones and others just because their virtual servers are now connected in a virtual switch... So, what? Even with technology changes, a network, even a virtual one is still a network and should be secured properly. It's not because we're consolidating and putting all together that old practices and rules are not valid. They might need to be adapted to the new technology... Read more →