2020 Cyber Threatscape Report
In the past year, security strategies and practices have been tested like no other. Rapidly accelerated digital transformations,
Virtualization uses software to create an abstraction layer over computer hardware that allows the hardware elements of a single computer—processors, memory, storage and more—to be divided into multiple virtual computers, commonly called virtual machines (VMs). Each VM runs its own operating system (OS) and behaves like an independent computer, even though it is running on just a portion of the actual underlying computer hardware.
Source: IBM