This post was originally published here by casey pechan.
You may remember January 2018 and the month of Spectre and Meltdown. Unlike many flash-in-the-pan zero-day vulnerabilities that can be fixed with a simple patch, Spectre and Meltdown were revealed to be deep problems extending all the way to processor designs which have been sold since the 1990s. In other words, this was a real “oh sh*!” moment that is still being evaluated by nearly every major US technology organization.
And while Intel, IBM, and others continue to roll out patches in the coming weeks, we have a report that will give you some insight today. We sponsored this Amalgam Insights paper: Providing a rapid response to Meltdown and Spectre for hybrid IT, in order for our readers to have a comprehensive overview and understanding of the breadth of these vulnerabilities, and what to expect.
In this paper Amalgam analyst Tom Petrocelli breaks down:
- Why Spectre and Meltdown are important
- The scope of Spectre and Meltdown
- Why security will be more challenging in a hybrid deployment model
To learn more about all things regarding Spectre and Meltdown, read our latest Amalgam Insights report.
Photo:Commuserv