{"id":5146,"date":"2014-06-26T20:00:00","date_gmt":"2014-06-26T20:00:00","guid":{"rendered":"https:\/\/www.ntegrait.com\/virtualization-security-myths\/"},"modified":"2014-06-26T20:00:00","modified_gmt":"2014-06-26T20:00:00","slug":"virtualization-security-myths","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/virtualization-security-myths\/","title":{"rendered":"Virtualization security myths"},"content":{"rendered":"
Businesses are relying increasingly on virtual machines to handle more critical data and tasks than ever before. Still, many are misguided about their security needs in a virtual environment. There are several myths that if believed can have serious consequences; leaving your organization vulnerable to an attack. Understanding these issues is key to helping you [\u2026]<\/p>\n","protected":false},"excerpt":{"rendered":"
Businesses are relying increasingly on virtual machines to handle more critical data and tasks than ever before. Still, many are misguided about their security needs in a virtual environment. There are several myths that if believed can have serious consequences; leaving your organization vulnerable to an attack. Understanding these issues is key to helping you…<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[8],"tags":[],"class_list":["post-5146","post","type-post","status-publish","format-standard","hentry","category-blog"],"acf":[],"yoast_head":"\n