Seamlessly Isolate Risky Clicks with Bromium Secure Platform 4.1 [Demo Video]

Most breaches start with the user performing a risky click Windows 10 and modern browsers are more secure, but still susceptible to risky clicks Bromium’s virtualization-based security seamlessly isolates risky clicks inside unbreakable virtual m… Continue reading Seamlessly Isolate Risky Clicks with Bromium Secure Platform 4.1 [Demo Video]

Is a host OS more vulnerable to a hypervisor escape if the guest OS knows the root password to the host?

This is assuming that escaping the hypervisor is the only way the guest OS could compromise the host– e.g. it’s not networked, isn’t sharing folders or the clipboard, etc. Does knowledge about the host’s root password matter… Continue reading Is a host OS more vulnerable to a hypervisor escape if the guest OS knows the root password to the host?

Local server applications using a web frontend on multi-user desktop environments

Currently I have multi-user linux servers where developers access through remote desktop and use the session as work environment.

But I’m a bit concerned about the increasing popularity of applications applications using a l… Continue reading Local server applications using a web frontend on multi-user desktop environments

Do any non-GNU/Linux display managers provide the same isolation as Wayland?

In discussions around the ongoing transition from X.org to Wayland, I regularly come across comments along the lines of “Linux security is not there yet”. This refers to Wayland’s promise of better (but not perfect) desktop i… Continue reading Do any non-GNU/Linux display managers provide the same isolation as Wayland?