What Cybersecurity Threats Do We Face In The Cloud?
Last week I wrote that compliance and complacency are major challenges in the cloud. Yes, defensive technology is the same. However, the cloud poses some specific threats. Multitenancy Multitenancy scares people the most. You share cloud infrastructure with other customers. Your cloud services are running on virtual machines. Those VMs run on shared hardware. You […]
How To Run Your Containers in the Cloud
Many organizations use cloud services. Many deploy network services as containers. And now, many are combining the two. Let’s look at the advantages of running containers in the cloud. Isn’t This Virtualization on Top of Virtualization? Yes! It has to be. There is no way to do what is defined as cloud computing without virtualization! […]
What’s The Story of the OpenSSL Hack?
As we discuss in Learning Tree’s Cloud Security Essentials course, the cloud is based on open-source technology. And, if you are developing your own solutions, as you do in PaaS (Platform as a Service) and IaaS (Infrastructure as a Service) cloud settings, you should use carefully tested and trusted open-source components. The OpenSSL project provides […]
Key Thieves Disturb the Peaceful Xen Garden
What is the sound of one VM hacking? Quite the racket of interprocess interrupts! Virtualization is an absolute requirement for cloud computing. Researchers are now discovering new ways to subvert virtualization. This is big. Most operating systems tinkerers are familiar with so-called Type 2 or Hosted virtualization. This is something like VMware Player (or Workstation […]