Access "Virtualization security: How vulnerable is your hypervisor?"
This article is part of the null issue of null
IT security is facing a bit of a paradox. On one hand, the sheer number of security-related regulations that network administrators must comply with is unprecedented. On the other hand, the industry is only just beginning to understand the security implications associated with virtualization. So what should virtual data centers do to address virtualization security? More on virtualization security Virtual security: New attack vectors, new ballgame Hypervisors: Which is right for you? Top 4 virtualization security gotchas Server virtualization security best practices guide NIST issues virtualization security guidelines Guarding against virtualization security risks and vulnerabilities Before delving into virtualization security, let’s start out by taking a look at the hypervisor, which is used by virtualization platforms such as VMware ESX and Microsoft’s Hyper-V. There are a lot of myths surrounding the ability to exploit the hypervisor. One virtualization security myth is that it is possible for an attacker to compromise the hypervisor and then take control... Access >>>