New & Notable
Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection News
June 20, 2019
As Alaska Airlines plots a flight path to a hybrid cloud infrastructure, it will navigate with an automated DevOps security tool that spans multiple IT environments.
April 28, 2016
Chase Cunningham of Armor spoke with SearchCloudSecurity at RSA Conference 2016 about the value of secure cloud hosting services, threat intelligence and more.
October 30, 2015
A critical Xen hypervisor security flaw that allows attackers to access host operating systems and had gone undiscovered for several years was finally patched this week.
May 13, 2015
CrowdStrike security researchers discovered a major bug that could impact a wide range of commonly-used virtualization platforms.
Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection Get Started
Bring yourself up to speed with our introductory content
A virtual firewall is a firewall device or service that provides network traffic filtering and monitoring for virtual machines (VMs) in a virtualized environment. Continue Reading
Containers in cloud computing have evolved from a security buzzword. Deployment of cloud containers is now an essential element of IT infrastructure protection. Continue Reading
Virtualization and container security are key topics in the Certificate of Cloud Security Knowledge credential. Test your knowledge with these CCSK practice questions. Continue Reading
Evaluate Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Security professionals often compare containers vs. VMs when determining whether virtualization or containerization is better for their company's security strategy. Continue Reading
VMs and cloud environments make the task of protecting workloads more difficult than ever. Can a cloud workload protection platform help your organization solve the problem? Continue Reading
Containers have revolutionized app development but pose many security challenges. Uncover how container vulnerability scanning can help and why to consider open source tools. Continue Reading
Manage Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection
Learn to apply best practices and optimize your operations.
Find out how container security best practices can address the four most common types of container and orchestrator vulnerabilities. Then mitigate threats with the right processes and tools. Continue Reading
Security researchers discovered how threat actors can use the Docker REST API for remote code execution attacks. Michael Cobb explains this threat to Docker containers. Continue Reading
Securing a platform as a service can sometimes get overlooked within enterprises. Expert Char Sample offers four simple rules for improving PaaS security and lowering cloud risks. Continue Reading
Problem Solve Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The more companies embrace application containerization, the more they need to know about container security issues and attack prevention methods. Continue Reading
When it comes to container security risks, organizations often worry about container escapes, but as expert Liz Rice explains, they should focus on prevention and patching. Continue Reading
A hypervisor deployment can put the security of an organization at risk, but there are ways to make it secure. Expert Judith Myerson outlines how to make the process safer. Continue Reading