Organisations failing to implement hypervisor security, says cloud supplier

Organisations are not implementing virtualisation and cloud infrastructure correctly, according to cloud and virtualisation specialist provider HyTrust.

Organisations are not implementing virtualisation and cloud infrastructure correctly, according to cloud and virtualisation specialist provider HyTrust.

"Attacks on the hypervisor are not the biggest, most imminent threat," said Eric Chiu, president and founder of HyTrust. "The management layer is a much more inviting target." The threat has multiplied with the growth of virtualisation "This is now officially an area of critical risk," he said.

Eric Chiu cited the example of the US subsidiary of Japanese pharmaceutical company Shionogi Pharma, where former employee Jason Cornish logged into his employer's network from a McDonalds and deleted 15 VMware virtual host systems.

"The Shionogi attack was conducted from miles away. The fact that virtualisation enables remote management only heightens the problem; with physical infrastructure. In this case, simple controls would have easily restricted what he was able to access, what functions he could perform, and where he'd need to be physically at the time," added Chiu.

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT risk management

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close