| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
The continuously changing security landscape poses new challenges almost daily. Some of these threats must to be met with dynamic response measures. However many threats at their core have certain fundamental concepts: hard drive persistence, ram manipulation, file and directory obfuscation, and corruption of legitimate running processes among many others. The advent of server and network device virtualization provides an entirely new flexibility and control over the status and security of these devices.This talk will demonstrate a means in which production servers and software defined network infrastructure can be destroyed and redeployed cyclically around the clock in minutes or even seconds in a way that is completely transparent to the user.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast