Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
Sports
History
News
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/16/10/f1/1610f1ba-94f9-ff90-fcf5-295f56cad680/mza_14832663211430209641.jpg/600x600bb.jpg
InfoSec Bites
HelloInfoSec
123 episodes
1 week ago
Welcome to Hello InfoSec, your ultimate hub for all things cybersecurity! Dive into our thrilling podcast series, InfoSec Bites, where we unleash deep dives into Information Security, jaw-dropping Major Security Incidents, cutting-edge Cloud Information Security, crucial Privacy topics, revolutionary Artificial Intelligence, mind-bending Quantum Computing, and so much more! Get ready to geek out with expert insights and stay ahead of the curve—hit that like button, subscribe now, and turn on notifications for fresh episodes that will blow your mind! https://www.youtube.com/@HelloInfoSec
Show more...
Technology
RSS
All content for InfoSec Bites is the property of HelloInfoSec and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome to Hello InfoSec, your ultimate hub for all things cybersecurity! Dive into our thrilling podcast series, InfoSec Bites, where we unleash deep dives into Information Security, jaw-dropping Major Security Incidents, cutting-edge Cloud Information Security, crucial Privacy topics, revolutionary Artificial Intelligence, mind-bending Quantum Computing, and so much more! Get ready to geek out with expert insights and stay ahead of the curve—hit that like button, subscribe now, and turn on notifications for fresh episodes that will blow your mind! https://www.youtube.com/@HelloInfoSec
Show more...
Technology
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/44370068/44370068-1759534421997-02e708de17178.jpg
Virtualisation and VDI: Architecture, Security, Exploitation, and Resilience
InfoSec Bites
37 minutes 45 seconds
1 month ago
Virtualisation and VDI: Architecture, Security, Exploitation, and Resilience

The discussion in this podcast provides an extensive analysis of the security challenges, exploitation techniques, and resilience strategies necessary for modern Virtual Machine (VM) and Virtual Desktop Infrastructure (VDI) environments. It details the fundamental security trade-offs between Type 1 (bare metal) and Type 2 (hosted) hypervisors, noting that enterprise solutions mandate the superior isolation of Type 1. It systematically examines critical attack vectors, including Virtual Machine Escape (VME), which targets complex paravirtualised devices, and microarchitectural side-channel attacks like Spectre and Meltdown. Furthermore, the discussion stresses that the most frequent and severe compromises target the centralised VDI control plane components, such as connection brokers and perimeter gateways, rather than low-level hypervisor flaws. Finally, the analysis concludes by presenting a comprehensive Zero Trust Architecture (ZTA) framework, recommending mandatory controls like network microsegmentation and rigorous session policy enforcement to contain breaches and secure the infrastructure.

InfoSec Bites
Welcome to Hello InfoSec, your ultimate hub for all things cybersecurity! Dive into our thrilling podcast series, InfoSec Bites, where we unleash deep dives into Information Security, jaw-dropping Major Security Incidents, cutting-edge Cloud Information Security, crucial Privacy topics, revolutionary Artificial Intelligence, mind-bending Quantum Computing, and so much more! Get ready to geek out with expert insights and stay ahead of the curve—hit that like button, subscribe now, and turn on notifications for fresh episodes that will blow your mind! https://www.youtube.com/@HelloInfoSec