[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Publicity] [Xen-devel] The Bitdefender virtual machine introspection library is now on GitHub
> On 31 Jul 2015, at 11:35, Lars Kurth <lars.kurth.xen@xxxxxxxxx> wrote: > >> >> On 30 Jul 2015, at 22:05, Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx> wrote: >> >> On 07/30/2015 09:36 PM, Sarah Conway wrote: >>> I think this blog would benefit from a bigger picture / simplified >>> explanation on how this will improve the security of Xen, which is a hot >>> topic for many reporters. >>> >>> Maybe pull out some of the main points/conclusions raised in >>> "Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, >>> Bitdefender and Ravi Sahita, Intel" instead of just linking to the PPT. >>> >>> Touch on security threats we face today, how/why advanced attacks evade >>> traditional security solutions, summary of memory introspection (its >>> benefits), where Xen is today with hardware enforced isolation providing >>> Xen with much improved security, what 4.6 will deliver. >> >> Sorry, just tried to refrain from being more verbose than strictly >> necessary. Hopefully I've now managed to strike the right balance with >> the content, please check the latest draft at your convenience. > > I think the article looks very good now. I propose to publish on Monday, if > there is no further feedback > > Regards > Lars I discussed with Sarah, and we may add a paragraph introducing Razvan as new speaker to the blog, pointing to the LinuxCon and two XenDevSummit talks on the subject. We are also looking at some other PR, which is why we may be delaying publication until Tuesday _______________________________________________ Publicity mailing list Publicity@xxxxxxxxxxxxxxxxxxxx http://lists.xenproject.org/cgi-bin/mailman/listinfo/publicity
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |