Security_Architecture Archive

I did some work recently assessing how Microsft’s Hypervisor (Hyper-V) addresses (or doesn’t address) some common network security based threats in a multi-tenant public cloud environment. I then set out to test whether there are controls in place to mitigate those threats. I would have liked to compare different Hypervisors and their capabilities, but I have yet to do that comparison. If you’re interested in testing independently, there are several good tools out there including nmap, yersinia, hping and scapy. Those four tools will allow you to test every scenario in this document. Some detail on the test case is provided in each section. First, some basic definitions that I use in this post: TOR switch: Top of rack switch Switch: Generally references the network [&hellip

Read More...


Warning: file_get_contents(/opt/httpd/sites/rickmayberry.com/gpslogger.txt): failed to open stream: No such file or directory in /var/sites/rickmayberry.com/wp-content/plugins/google-maps-widget/google-maps-widget.php on line 150