Securing the Virtual Environment: How to Defend the