“Do you belive that my being stronger or faster
has anything to do with my muscles in this place?
You think that's air you're breathing now?”
- Morpheus, The Matrix
Today’s question: What happens when you assume virtual security?
Virtual Machines (VMs) were originally created to solve the problems of managing PC systems with mostly Windows operating systems, as a replacement for more resilient and fault tolerant technology that Intel PCs were replacing in enterprise computing.
Things have evolved significantly since then, but with great technology comes great security risk. What can we do to mitigate that risk and protect that virtual reality?
In this week’s episode of InSecurity, Matt Stephenson digs deep into the weeds of the virtual world with industry legend Jeremiah Cornelius. They talk about what’s easy and what’s hard about securing data in virtual environments. Stick around… you might just learn a little something about the nature of reality.
About Jeremiah Cornelius
Jeremiah Cornelius has been an information security professional since 1995. He was previously Executive Security Advisor and Technology Specialist for Microsoft, facilitating technical relationships with CSO's for Silicon Valley's largest Internet commerce and online media enterprises.
Jeremiah's prior experience covers support of development and Internet systems security, defensive technical controls, vulnerability assessment and identifying platform and infrastructure security risks.
About Matt Stephenson
Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV.
Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before.