New & Notable
Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection News
April 28, 2016
Chase Cunningham of Armor spoke with SearchCloudSecurity at RSA Conference 2016 about the value of secure cloud hosting services, threat intelligence and more.
October 30, 2015
A critical Xen hypervisor security flaw that allows attackers to access host operating systems and had gone undiscovered for several years was finally patched this week.
May 13, 2015
CrowdStrike security researchers discovered a major bug that could impact a wide range of commonly-used virtualization platforms.
March 10, 2015
In a surprise move, Amazon Web services was able to patch a Xen hypervisor security flaw without a mass reboot of its EC2 infrastructure. So how did AWS pull it off?
Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection Get Started
Bring yourself up to speed with our introductory content
Hypervisor security is the process of ensuring the hypervisor, the software that enables virtualization, is secure throughout its life cycle, including during development, implementation, provisioning, management and de-provisioning. Continue Reading
A virtual firewall is a firewall device or service that provides network traffic filtering and monitoring for virtual machines (VMs) in a virtualized environment. Continue Reading
Securing a platform as a service can sometimes get overlooked within enterprises. Expert Char Sample offers four simple rules for improving PaaS security and lowering cloud risks. Continue Reading
Evaluate Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Microsoft's secretive, potential new feature InPrivate Desktop could give security teams access to disposable sandboxes. Expert Ed Moyle explains how the feature could work. Continue Reading
In the last couple of years, VM escape vulnerabilities have popped up and caused problems for enterprises that rely on the cloud. Expert Ed Moyle explains how to handle these issues. Continue Reading
Container isolation doesn't cut it in production. Instead, beef up security from the infrastructure to the application code, and be prepared to use some new tools to do it. Continue Reading
Manage Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection
Learn to apply best practices and optimize your operations.
Find out how container security best practices can address the four most common types of container and orchestrator vulnerabilities. Then mitigate threats with the right processes and tools. Continue Reading
Security researchers discovered how threat actors can use the Docker REST API for remote code execution attacks. Michael Cobb explains this threat to Docker containers. Continue Reading
Cisco's new project Contiv automates operational policies for containerized applications in the cloud. Expert Dan Sullivan explains the benefits of this open source tool. Continue Reading
Problem Solve Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A hypervisor deployment can put the security of an organization at risk, but there are ways to make it secure. Expert Judith Myerson outlines how to make the process safer. Continue Reading
Two VMware vulnerabilities in vSphere Data Protection were recently patched. Expert Judith Myerson explains how the flaws work and how to defend against them. Continue Reading
Researchers recently proved that it's possible to steal cloud data from a CPU cache. Expert Rob Shapland discusses how this works and what it means for multi-tenant cloud security. Continue Reading