By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection News
April 28, 2016
Chase Cunningham of Armor spoke with SearchCloudSecurity at RSA Conference 2016 about the value of secure cloud hosting services, threat intelligence and more.
October 30, 2015
A critical Xen hypervisor security flaw that allows attackers to access host operating systems and had gone undiscovered for several years was finally patched this week.
May 13, 2015
CrowdStrike security researchers discovered a major bug that could impact a wide range of commonly-used virtualization platforms.
March 10, 2015
In a surprise move, Amazon Web services was able to patch a Xen hypervisor security flaw without a mass reboot of its EC2 infrastructure. So how did AWS pull it off?
Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection Get Started
Bring yourself up to speed with our introductory content
Securing a platform as a service can sometimes get overlooked within enterprises. Expert Char Sample offers four simple rules for improving PaaS security and lowering cloud risks. Continue Reading
Security teams need to practice and test data analysis, but it can be challenging to do in small environments. Expert Frank Siemons explains some ways to make it work anyway. Continue Reading
The Open Container Project is creating a standard container image format and runtime engine. Expert Dan Sullivan explains how it can improve container security. Continue Reading
Evaluate Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Cisco's new project Contiv automates operational policies for containerized applications in the cloud. Expert Dan Sullivan explains the benefits of this open source tool. Continue Reading
What is virtual machine introspection, and can it help improve cloud security? Expert Dan Sullivan explains techniques behind VM introspection and how it can boost security in the cloud. Continue Reading
Expert Dan Sullivan outlines the security issues associated with Docker and explains how the AWS EC2 Container Service can help resolve them. Continue Reading
Manage Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection
Learn to apply best practices and optimize your operations.
Network functions virtualization can complement SDN and benefit enterprises, but there are NFV security considerations that must be addressed. Expert Judith Myerson explains. Continue Reading
Xen bugs have been popping up, creating concerns about the security of open source virtualization software. Expert Dan Sullivan explains why open source is not to blame for security pitfalls. Continue Reading
Expert Dan Sullivan takes a look at how CoreOS Rocket and Docker differ security-wise, and how to decide which to deploy in your enterprise. Continue Reading
Problem Solve Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The Flip Feng Shui attack can target virtual machines. Expert Judith Myerson explains the exploit and describes how to prevent it from hijacking enterprise VMs. Continue Reading
A stored XSS exploit can be damaging to enterprises that aren't fully protected. Expert Matthew Pascucci explains what stored XSS attacks are and how to defend against them. Continue Reading
RHEL virtual machines hosted in Microsoft Azure were recently found to have significant security vulnerabilities. Expert Rob Shapland explains them and what enterprises can learn. Continue Reading