Zoekresultaten
  1. 28 jun.

    Chats with ! Today's are around ! What are the key themes or that one needs to consider when planning a new ? And what does mean to you?

  2. Thank you everyone for joining today's . Thank you for sponsoring. I'll announce the date for the next chat sometime soon. Please follow for more information. Have a great day!

  3. A9: …. Also, consider how hard it is to properly monitor security events, or keep patch levels up to date, when you have an ever-changing large number of VMs (see A2 above)…

  4. A9… – either they do not work at all, create technical problems, or do not adequately carry out their security functions – ….

  5. 27 jun.
    Als antwoord op

    There will always be security risks, threats, and vulnerabilities! Stay informed, deploy multi-layered security, plan for the worst, and cover all attack vectors. Reduce the gap between when the breach occurred and when you detected it.

  6. Q9: Any other big picture security risks with VMs and Hypervisors?

  7. 27 jun.
    Als antwoord op

    I can’t stress this enough: ultimately, it’s all about the right security! One that covers all attack vectors, it’s isolated, but also has visibility and context, and is tightly integrated with the hypervisor.

  8. A8: …as a rogue add-on can undermine an entire VM-based infrastructure the same way that other malware can. And, an attack by such malware may be more difficult that is typical for classic security software to detect.

  9. Q8: Do you recommend using hypervisor add ons?

  10. Q7: Do VM images – as maintained by many parties today – create security risks?

  11. Q5: What about other forms of inter-process communication? Do they create risks?

  12. 27 jun.

    A2: Cloud and Hybrid Cloud solutions are becoming standard for sure mainly because ease of spinning up resources and only billed for resources used on consumption model. Even more reason to make sure you are secure :-)

  13. 27 jun.
    Als antwoord op

    : … That’s why it’s important to deploy in-guest and hypervisor-based security. Basically, they deny known/unknown vulnerabilities from being exploited and malware from being executed.

  14. A3: … what if someone manages to load data into a VM and manipulate the VMs behavior by writing something in memory that the VM uses? (Also, keep in mind that systems and data of different sensitivity levels often end up on the same physical infrastructure.)

  15. 27 jun.
    Als antwoord op

    Also, there are few security solutions that work with/through the hypervisor to secure the VM (from outside the VM) from taking over the hypervisor. Boggles the mind, doesn't it? =)

  16. Q2: But isn’t cloud becoming pretty standard anyway? (Despite all of the security concerns)

  17. Q1: Why is virtual machine / hypervisor architecture sometimes considered the Achilles Heel of all cloud computing?

  18. Today's CyberSecurity Twitter Chat Begins Now! Please follow to participate.

  19. 27 jun.

    The is happening today at noon US ET. Come chat about the importance of security when it comes to virtual machines and hypervisors 🎙

Het laden lijkt wat langer te duren.

Twitter is mogelijk overbelast of ondervindt een tijdelijke onderbreking. Probeer het opnieuw of bekijk de Twitter-status voor meer informatie.