The Future of Drone Tech

The Future of Drone Tech

The Future of Drone Tech There are three interesting concepts in the drone world of today; The first is the GPS based follow me, a connection between the controller used and the drone. The drone can “follow” the GPS signal of the controlling device.  If
VDI Technology Is Changing The Traditional Workspace

VDI Technology Is Changing The Traditional Workspace

VDI Technology These days, the location and nature of a workplace can be rather fluid. No longer are modern workplaces tied to static locations which employees daily visit. Of course, many of us continue to work in bricks-and-mortar structures and cubicles; however, given various companies'

CONTRIBUTORS

The IoT-Connected Car of Today - Cases From Hertz, Nokia, NTT, Mojio & Concur Technologies

The IoT-Connected Car of Today – Cases From Hertz, Nokia, NTT, Mojio & Concur Technologies

The IoT-Connected Car of Today Imagine a world where your car not only drives itself, but also says intelligent things ...
Apcela

After the SD-WAN: leveraging data and AI to optimize network operations

AI to Optimize Network Operations Increasing numbers of companies have implemented SD-WAN technology, thanks to benefits like higher performance, lower ...
Overcoming Compliance Challenges and Regulatory Risk In The Cloud

Overcoming Compliance Challenges and Regulatory Risk In The Cloud

Mitigating Regulatory Risk In The Cloud Some of the great business opportunities for Unified Communications as a Service (UCaaS) integrators ...

RESOURCES

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services For Your Company

Business Intelligence (BI) Services Business Intelligence (BI) services have recently seen an explosion of innovation and choices for business owners and entrepreneurs. So many choices, in fact, that many companies aren’t sure which business intelligence company to use. To help ...
Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs ...
Machine Learning Open-Source Tools

Do More With Machine Learning Thanks to These 6 Open-Source Tools

Machine Learning Open-Source Tools We are in the middle of a machine learning, AI and big data renaissance — at least, that’s what we’re calling it. Seemingly everyone is interested in this technology these days, and for a good reason ...
12 WordPress Managed Hosting Services

12 WordPress Managed Hosting Services

WordPress Hosting Services WordPress hosting services has exploded in popularity as a blogging tool and content management system in recent years, and is now used by more than 23.3 percent (2018 Edit: 53%) of the top 10 million websites worldwide. Due ...
10 Prototyping Tools To Help Build Your Startup

10 Prototyping Tools To Help Build Your Startup

Prototyping Tools We are continuing this week by focusing on startup tools, tips and tweaks that will help you build, design, manage and market your way into the cloud based business that you want to be. Last week we offered a ...
The Lighter Side Of The Cloud - Obscurity
Gavin Hill

The Great Arms Race For Security: Virtualization

The Great Arms Race For Security

Since its infancy in the early seventies when the first computer virus was created, the malware and anti-malware business has grown into multi-billion dollar industries. No longer are script kiddies creating malware for notoriety, instead the malware industry is run by organized criminals who invest time and money in new technologies and methods to compromise systems for profit.

The evolution of malware is the driver for the progress of security. Malware propagation has gone from floppy disks, to email attachments, and on to remote exploits of vulnerabilities. Malicious software itself has become more sophisticated by using kernel-level code to hide as rootkits, effectively moving down the stack. The result: an ‘arms race’ between organized criminals and security vendors. Each party reacts to changes in the industry to gain the upper hand. Take for example the growth in broadband adoption since the early 2000’s. As broadband adoption grew so too did the number of endpoints in botnets.

Security vendors process in excess of 4 billion requests per day to stop malware from propagating. However, the basic fundamentals of security have not changed in over 20 years. Malware takes advantage of exploiting vulnerabilities in operating systems and applications that run in them. The key point is that security solutions are implemented to stop malware within an operating system; however there is no such thing as a full-proof system. Security solutions operate within the confines of an operating system privilege structure. When attempting to inspect the system it is impossible to guarantee the integrity of the execution space of the security software running in the same execution space as malware. Therefore, beyond the question of whether or not a system has been compromised, it is a matter of what has not been found. With this in mind, the challenge for the security industry is to make the cost of attack so expensive that organized criminals choose different easier methods – for example basic social engineering techniques like a 451 scam.

Just as the rise of the Internet provided new opportunities for attackers, so too has virtualization and cloud technologies provided both security experts and attackers with new opportunities. With cloud computing the security challenge is even further exacerbated simply because end-users do not have access to the underlying infrastructure. Understanding how changing the infrastructure beneath endpoints affects endpoint security is elemental for security strategies. With all the benefits that virtualization brings, there are also new risks. Side channel exploitation, where a virtual machine is attacked from a neighboring virtual machine via a vulnerability are possible. This is simply due to the fact that multiple virtual machines share the same hardware via the hypervisor. In the case of cloud computing where multi-tenancy is the norm, there is no assurance that the end-user controlling a neighboring virtual machine has malicious intentions or not.

Virtualization and cloud computing is changing the security industry, both from a technology standpoint and the way it is consumed. With the benefits of a pay-as-you-grow model that cloud computing offers, end-users are able to quickly deploy IT infrastructure that addresses the business need without a large capital outlay. The security industry is evolving to meet this same licensing model requirements. However, even by meeting the needs of end-user license model requirements in the cloud; the challenge still remains the same. It is impossible to guarantee the integrity of the execution space of the security software running in the same execution space as threats.

With virtualization technology we now have the opportunity to exponentially raise the cost of attack on a system by gaining full visibility into the entire stack.

By utilizing hypervisor introspection technology it is possible to ensure the integrity of critical operating system areas, like the kernel for example. Through these introspective techniques threats are prevented from hiding or executing certain payloads within an operating system. Hypervisor introspection provides the security industry with the tooling to exponentially raise the cost of attack, by gaining full visibility into the execution space without operating in the same space that threats operate in. Similar to the movie “Minority report” where in the future criminals are arrested before they commit a crime, so too does virtualization technology enable security vendors to gain full visibility into systems and operate outside of the execution space that threats exist in.

By Gavin Hill

Gavin Hill

Vice President, Product and Strategy at Bromium,

I am passionate about bringing new products to market and making them successful through defining and executing upon clear product strategy. I have a proven track record in delivering first to market solutions over a broad range of security technologies, including, encryption, cloud and virtualization, messaging, and collaboration. I have been successful in leading global teams consisting of product management, marketing and business development.

CLOUDTWEAKS COMMUNITY PARTNERS

Each year we provide a number of highly customized branded programs to community support partners and going into our 10th year at CloudTweaks is no different. Sponsorship opportunities will be available for all budgets and sizes including the (premium) thought leadership exposure program or the webinar, podcast, white paper or explainer video lead generation programs.  Contact us for more information on these opportunities.

Cloud Community Supporters

(ISC)²
Cisco
SAP
CA Technologies
Dropbox

Cloud community support comes from (paid) sponsorship or (no cost) collaborative network partnership initiatives.