Article analysis
After reading Chapter 9, Jamsa and the article: https://ucumberlands.blackboard.com/bbcswebdav/pid-214804-dt-forum-rid-31466288_1/xid-31466288_1
discussed FOUR (4) ways in which cloud security managers might reduce the chance of a hypervisor being taken over by malicious code.