Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection
New & Notable
Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection News
-
June 20, 2019
20
Jun'19
Alaska Airlines charts course for DevOps security
As Alaska Airlines plots a flight path to a hybrid cloud infrastructure, it will navigate with an automated DevOps security tool that spans multiple IT environments.
-
April 28, 2016
28
Apr'16
Secure cloud hosting: Why taking ownership is crucial
Chase Cunningham of Armor spoke with SearchCloudSecurity at RSA Conference 2016 about the value of secure cloud hosting services, threat intelligence and more.
-
October 30, 2015
30
Oct'15
Xen hypervisor security flaw patched after seven years
A critical Xen hypervisor security flaw that allows attackers to access host operating systems and had gone undiscovered for several years was finally patched this week.
-
May 13, 2015
13
May'15
VENOM zero-day vulnerability strikes virtual machine security
CrowdStrike security researchers discovered a major bug that could impact a wide range of commonly-used virtualization platforms.
Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection Get Started
Bring yourself up to speed with our introductory content
-
Use these CCSK practice questions to prep for the exam
Virtualization and container security are key topics in the Certificate of Cloud Security Knowledge credential. Test your knowledge with these CCSK practice questions. Continue Reading
-
hypervisor security
Hypervisor security is the process of ensuring the hypervisor, the software that enables virtualization, is secure throughout its life cycle, including during development, implementation, provisioning, management and de-provisioning. Continue Reading
-
virtual firewall
A virtual firewall is a firewall device or service that provides network traffic filtering and monitoring for virtual machines (VMs) in a virtualized environment. Continue Reading
Evaluate Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Cloud workload protection platform security benefits, features
VMs and cloud environments make the task of protecting workloads more difficult than ever. Can a cloud workload protection platform help your organization solve the problem? Continue Reading
-
Benefits of open source container vulnerability scanning
Containers have revolutionized app development but pose many security challenges. Uncover how container vulnerability scanning can help and why to consider open source tools. Continue Reading
-
CCSK cert guide author's insights into cloud security credential
The author of a Certificate of Cloud Security Knowledge exam guide offers insights into certifications, top considerations for those pursuing the CCSK and more. Continue Reading
Manage Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection
Learn to apply best practices and optimize your operations.
-
VMs vs. containers: Which is better for security?
Security professionals make technology decisions every day. Learn about the important security properties of VMs vs. containers and how they affect an organization's security posture. Continue Reading
-
Four container security vulnerabilities and how to avoid them
Find out how container security best practices can address the four most common types of container and orchestrator vulnerabilities. Then mitigate threats with the right processes and tools. Continue Reading
-
How the Docker REST API can be turned against enterprises
Security researchers discovered how threat actors can use the Docker REST API for remote code execution attacks. Michael Cobb explains this threat to Docker containers. Continue Reading
Problem Solve Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
How can a hypervisor deployment avoid security risks?
A hypervisor deployment can put the security of an organization at risk, but there are ways to make it secure. Expert Judith Myerson outlines how to make the process safer. Continue Reading
-
How can VMware vulnerabilities in vSphere expose credentials?
Two VMware vulnerabilities in vSphere Data Protection were recently patched. Expert Judith Myerson explains how the flaws work and how to defend against them. Continue Reading
-
What a CPU cache exploit means for multi-tenant cloud security
Researchers recently proved that it's possible to steal cloud data from a CPU cache. Expert Rob Shapland discusses how this works and what it means for multi-tenant cloud security. Continue Reading