Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection News
October 30, 2015
A critical Xen hypervisor security flaw that allows attackers to access host operating systems and had gone undiscovered for several years was finally patched this week.
May 13, 2015
CrowdStrike security researchers discovered a major bug that could impact a wide range of commonly-used virtualization platforms.
March 10, 2015
In a surprise move, Amazon Web services was able to patch a Xen hypervisor security flaw without a mass reboot of its EC2 infrastructure. So how did AWS pull it off?
October 09, 2014
After a Xen hypervisor flaw led several major cloud providers to reboot their host servers, experts say future cloud computing hypervisor security issues will likely cause further service disruptions.
Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection Get Started
Bring yourself up to speed with our introductory content
The Open Container Project is creating a standard container image format and runtime engine. Expert Dan Sullivan explains how it can improve container security. Continue Reading
Virtualization expert Paul Henry provides a step-by-step guide to imaging a virtual machine disk (*flat.vmdk) in a forensically sound manner. Continue Reading
While the benefits of cloud containers are readily apparent, there aren't clear guidelines on how to secure the technology. Expert Rob Shapland offers pointers on how to stay safe. Continue Reading
Evaluate Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Dan Sullivan outlines the security issues associated with Docker and explains how the AWS EC2 Container Service can help resolve them. Continue Reading
Public cloud providers were forced to reboot their cloud instances to implement Xen hypervisor security updates. Learn what these updates mean for public cloud security. Continue Reading
Expert Paul Henry discusses how the draft NIST Special Publication 800-125-A can help enterprises better understand the threat landscape in a virtual realm. Continue Reading
Manage Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection
Learn to apply best practices and optimize your operations.
Expert Dan Sullivan takes a look at how CoreOS Rocket and Docker differ security-wise, and how to decide which to deploy in your enterprise. Continue Reading
Implementing ingress and egress filtering at the border router can help greatly improve security in a VMware-based virtual data center. Expert Paul Henry explains how. Continue Reading
The VMware ESXi hypervisor, particularly its kernel, offer several security features vital to a secure VMware cloud environment. Virtualization expert Paul Henry reviews the different levels of ESXi security. Continue Reading
Problem Solve Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The VENOM cloud vulnerability was called the next Heartbleed, but how bad is it? Expert Rob Shapland explains the affect it should have on your enterprise. Continue Reading
Expert Paul Kirvan discusses the debut of the VMware NSX platform and what it means to both network virtualization security and cloud security. Continue Reading
Expert Dave Shackleford analyzes the likelihood and effects of cross-VM side channel attacks in the cloud and offers mitigations for concerned users. Continue Reading