IDG Contributor Network: How to handle risks of hypervisor hacking
Global cloud computing and digital systems today would not exist without virtualization and hypervisors. Virtualization and hypervisors are basic tools for implementing digital systems that respond from moment to moment to varying demands without slow and expensive physical reconfiguration of hardware and rebuilding of software execution stacks and heavy investment in hardware that is only used during peak loads.Last blog, I described the dangers of a hypervisor attack. How can such an attack occur? There are a number of ways.Resource simulations A hypervisor provides software simulations of basic computing resources — like CPUs, memory, storage and network connections — that isolate VMs from one another. But the isolation may have soft spots. For example, freed simulated memory for one VM might be the same physical memory the hypervisor allocates to another VM. If the hypervisor does not blank out the reallocated physical memory, the second VM has access to data from the first VM and a data breach ensues. All resource simulations are subject to dangerous implementation errors. Simulated CPU registers, storage buffers and network buffers, all present opportunities for coding mistakes that permit data or control breaches.To read this article in full or to leave Continue reading
Recent push by Microsoft highlights need to keep container OS platforms tight.
Mellanox and HPE build machine learning data centers; Talari Networks partners with Technology Solutions.
PaaS and IaaS businesses will ‘accelerate into hyper growth’ in 2018, Larry Ellison says.
Moving applications and data to the public cloud brings a number of security advantages.
Download now to learn the latest on container and cloud orchestration.
