KVM Security in Multi-Tenant Cloud Environments

It’s useful to note that security in an open source KVM environment occurs on three levels: the kernel layer within the Linux OS, network layer, and at the hardware level.

Since its kernel-based protection mechanisms were created early on in Linux development, KVM incorporates key SELinux controls to provide isolation and confinement for processes. This means data and applications are fully protected, even in multi-tenant environments where multiple clients are served by one software instance.

Read more

Eight Tips for Making Internal Job Moves

I have been at Global Knowledge about eight and a half years and have had eight different roles. Which made me think, “Why have I been able to change jobs so often?” To begin with I am the type of person who likes to look at the big picture and understand what people do. How do things come together? How do the pieces fit? Who does what and why? I am a believer in collaboration so I try to meet with people to understand their role. Sometimes knowing who to go to for help is the most important thing in the process of trying to accomplish something.

Read more

WPS — The Wireless Network Backdoor

WPS or WiFi Protected Setup (a.k.a. WSC or WiFi Simple Config) is a handy feature of a wireless base station that allows easy connection of new clients by the press of a physical button. WPS is required to be enabled by default for a manufacturer/vendor to achieve WiFi Alliance certification on their products. This means that most devices have it enabled right out of the box.

Read more