In April 2004 I wrote my first article on the topic of virtualization security. I was trying to bring attention to the security aspects of this “new” technology that was getting quite a bit of hype at the time. The hope was that this time security would not be an afterthought, that we would reverse the equine-escape/egress-closure sequence. The naivet