Building off of the “101” article written here, let’s continue on with the roadmap to becoming a security researcher. In the previous article I explained the many interpretations of what this role consists of versus the “white hat hacker” nomenclature. In this blog post and onward I will be sticking to the “security researcher” title (unless otherwise stated), as this seems … [Read more...]
When VMs Get Pwned: Real Security in Virtual Environments
This week I wrote an article for a few of our partners, include the well-known SpiceWorks IT pro forum. If you're interesting in learning about the additional risks introduced by hardware vritualization and in securing your virtual environment, read on. Spinning up a virtual machine (VM) without a good security policy, a hardened hypervisor, and virtual security controls is … [Read more...]