{"id":28295,"date":"2018-01-04T11:35:55","date_gmt":"2018-01-04T11:35:55","guid":{"rendered":"https:\/\/hosting.nl\/blog\/addressing-meltdown-and-spectre-vulnerabilities\/"},"modified":"2026-01-23T14:24:09","modified_gmt":"2026-01-23T14:24:09","slug":"addressing-meltdown-and-spectre-vulnerabilities","status":"publish","type":"post","link":"https:\/\/hosting.nl\/en\/blog\/addressing-meltdown-and-spectre-vulnerabilities\/","title":{"rendered":"Addressing Meltdown and Spectre vulnerabilities"},"content":{"rendered":"<h2>Addressing Meltdown and Spectre vulnerabilities<\/h2>\n<div class=\"form\">\n<form id=\"domainchecker\" class=\"domain\" action=\"https:\/\/hosting.nl\/domainchecker\" method=\"post\" name=\"headerDomainchecker\"><\/form>\n<\/div>\n<p>Alkmaar &#8211; January 4<\/p>\n<p>We are currently conducting an inventory and impact assessment of the Meltdown and Spectre vulnerabilities for the various (cloud) environments where we are working through <a href=\"https:\/\/cyso.com\" target=\"_blank\" rel=\"noopener\"><br \/>\n  <strong>CYSO<\/strong><br \/>\n<\/a> make use of.<br \/>\nFor the techies, the following background article from <strong>&#8216;Tweakers&#8217;<\/strong> is very interesting: http:\/\/bit.ly\/2lUxCQH<\/p>\n<p>As soon as additional information is available we will inform you immediately.<\/p>\n<h2><strong>SUPPLEMENT JAN. 5<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">Several actions have since been taken and are still underway to address the <a href=\"https:\/\/tweakers.net\/reviews\/5939\/meltdown-en-spectre-vraag-en-antwoord.html\" target=\"_blank\" rel=\"noopener\"><br \/>\n  <strong>Meltdown and Spectre security vulnerabilities<\/strong><br \/>\n<\/a> mitigation. Both at the infrastructure level and individual servers are required by security measures and we have partnered with <a href=\"https:\/\/cyso.com\/nl\/over-ons\/nieuws\/\" target=\"_blank\" rel=\"noopener\"><br \/>\n  <strong>Cyso<\/strong><br \/>\n<\/a> taking them.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">INFRASTRUCTURE<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The infrastructure of our VMware platforms has been undergoing continuous and phased updates since yesterday afternoon. Because of the redundant, high-availability setup, our customers are not inconvenienced by this.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SERVERS<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Updates to all individual Web servers will also be provided. However, patches are not already available for all operating systems. Once these become available, they are first carefully tested as their implementation often proves difficult and has several dependencies that need to be mapped out. Once we have sufficiently tested the update, we will start scheduling additional maintenance windows to update the affected servers and communicate this maintenance to our customers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We will, of course, continue to closely monitor news and current developments.<\/span><\/p>\n<p>For questions we are of course available <a href=\"https:\/\/hosting.nl\/en\/contact\/\" target=\"_blank\" rel=\"noopener\"><br \/>\n  <strong>through the normal channels<\/strong><br \/>\n<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Addressing Meltdown and Spectre vulnerabilities Alkmaar &#8211; January 4 We are currently conducting an inventory and impact assessment of the Meltdown and Spectre vulnerabilities for the various (cloud) environments where we are working through CYSO make use of. For the techies, the following background article from &#8216;Tweakers&#8217; is very interesting: http:\/\/bit.ly\/2lUxCQH As soon as additional [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":25790,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-28295","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nieuws"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Addressing Meltdown and Spectre vulnerabilities | Hosting.NL<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hosting.nl\/en\/blog\/addressing-meltdown-and-spectre-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Addressing Meltdown and Spectre vulnerabilities | Hosting.NL\" \/>\n<meta property=\"og:description\" content=\"Addressing Meltdown and Spectre vulnerabilities Alkmaar &#8211; January 4 We are currently conducting an inventory and impact assessment of the Meltdown and Spectre vulnerabilities for the various (cloud) environments where we are working through CYSO make use of. For the techies, the following background article from &#8216;Tweakers&#8217; is very interesting: http:\/\/bit.ly\/2lUxCQH As soon as additional [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hosting.nl\/en\/blog\/addressing-meltdown-and-spectre-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"Hosting.NL\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-04T11:35:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-23T14:24:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hosting.nl\/wp-content\/uploads\/Meltdown_SQR_740x400.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"740\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mark Kraakman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Kraakman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/hosting.nl\\\/en\\\/blog\\\/addressing-meltdown-and-spectre-vulnerabilities\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hosting.nl\\\/en\\\/blog\\\/addressing-meltdown-and-spectre-vulnerabilities\\\/\"},\"author\":{\"name\":\"Mark Kraakman\",\"@id\":\"https:\\\/\\\/hosting.nl\\\/en\\\/#\\\/schema\\\/person\\\/22ba9dfdfb0dd056274cec0357468cc8\"},\"headline\":\"Addressing Meltdown and Spectre vulnerabilities\",\"datePublished\":\"2018-01-04T11:35:55+00:00\",\"dateModified\":\"2026-01-23T14:24:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/hosting.nl\\\/en\\\/blog\\\/addressing-meltdown-and-spectre-vulnerabilities\\\/\"},\"wordCount\":237,\"publisher\":{\"@id\":\"https:\\\/\\\/hosting.nl\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/hosting.nl\\\/en\\\/blog\\\/addressing-meltdown-and-spectre-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hosting.nl\\\/wp-content\\\/uploads\\\/Meltdown_SQR_740x400.jpg\",\"articleSection\":[\"Nieuws\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/hosting.nl\\\/en\\\/blog\\\/addressing-meltdown-and-spectre-vulnerabilities\\\/\",\"url\":\"https:\\\/\\\/hosting.nl\\\/en\\\/blog\\\/addressing-meltdown-and-spectre-vulnerabilities\\\/\",\"name\":\"Addressing Meltdown and Spectre vulnerabilities | Hosting.NL\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hosting.nl\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/hosting.nl\\\/en\\\/blog\\\/addressing-meltdown-and-spectre-vulnerabilities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/hosting.nl\\\/en\\\/blog\\\/addressing-meltdown-and-spectre-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hosting.nl\\\/wp-content\\\/uploads\\\/Meltdown_SQR_740x400.jpg\",\"datePublished\":\"2018-01-04T11:35:55+00:00\",\"dateModified\":\"2026-01-23T14:24:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/hosting.nl\\\/en\\\/blog\\\/addressing-meltdown-and-spectre-vulnerabilities\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/hosting.nl\\\/en\\\/blog\\\/addressing-meltdown-and-spectre-vulnerabilities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hosting.nl\\\/en\\\/blog\\\/addressing-meltdown-and-spectre-vulnerabilities\\\/#primaryimage\",\"url\":\"https:\\\/\\\/hosting.nl\\\/wp-content\\\/uploads\\\/Meltdown_SQR_740x400.jpg\",\"contentUrl\":\"https:\\\/\\\/hosting.nl\\\/wp-content\\\/uploads\\\/Meltdown_SQR_740x400.jpg\",\"width\":740,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/hosting.nl\\\/en\\\/blog\\\/addressing-meltdown-and-spectre-vulnerabilities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Hosting.NL\",\"item\":\"https:\\\/\\\/hosting.nl\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Addressing Meltdown and Spectre vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/hosting.nl\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/hosting.nl\\\/en\\\/\",\"name\":\"Hosting.NL\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/hosting.nl\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/hosting.nl\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/hosting.nl\\\/en\\\/#organization\",\"name\":\"Hosting.NL\",\"url\":\"https:\\\/\\\/hosting.nl\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hosting.nl\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/hosting.nl\\\/wp-content\\\/uploads\\\/hostingnl-default-logo.png\",\"contentUrl\":\"https:\\\/\\\/hosting.nl\\\/wp-content\\\/uploads\\\/hostingnl-default-logo.png\",\"width\":242,\"height\":50,\"caption\":\"Hosting.NL\"},\"image\":{\"@id\":\"https:\\\/\\\/hosting.nl\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/hosting.nl\\\/en\\\/#\\\/schema\\\/person\\\/22ba9dfdfb0dd056274cec0357468cc8\",\"name\":\"Mark Kraakman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hosting.nl\\\/wp-content\\\/litespeed\\\/avatar\\\/b77879d685fc20c1b8a18112389c8ffa.jpg?ver=1776945508\",\"url\":\"https:\\\/\\\/hosting.nl\\\/wp-content\\\/litespeed\\\/avatar\\\/b77879d685fc20c1b8a18112389c8ffa.jpg?ver=1776945508\",\"contentUrl\":\"https:\\\/\\\/hosting.nl\\\/wp-content\\\/litespeed\\\/avatar\\\/b77879d685fc20c1b8a18112389c8ffa.jpg?ver=1776945508\",\"caption\":\"Mark Kraakman\"},\"url\":\"https:\\\/\\\/hosting.nl\\\/en\\\/blog\\\/author\\\/mark-kraakman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Addressing Meltdown and Spectre vulnerabilities | Hosting.NL","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hosting.nl\/en\/blog\/addressing-meltdown-and-spectre-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Addressing Meltdown and Spectre vulnerabilities | Hosting.NL","og_description":"Addressing Meltdown and Spectre vulnerabilities Alkmaar &#8211; January 4 We are currently conducting an inventory and impact assessment of the Meltdown and Spectre vulnerabilities for the various (cloud) environments where we are working through CYSO make use of. For the techies, the following background article from &#8216;Tweakers&#8217; is very interesting: http:\/\/bit.ly\/2lUxCQH As soon as additional [&hellip;]","og_url":"https:\/\/hosting.nl\/en\/blog\/addressing-meltdown-and-spectre-vulnerabilities\/","og_site_name":"Hosting.NL","article_published_time":"2018-01-04T11:35:55+00:00","article_modified_time":"2026-01-23T14:24:09+00:00","og_image":[{"width":740,"height":400,"url":"https:\/\/hosting.nl\/wp-content\/uploads\/Meltdown_SQR_740x400.jpg","type":"image\/jpeg"}],"author":"Mark Kraakman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mark Kraakman","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hosting.nl\/en\/blog\/addressing-meltdown-and-spectre-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/hosting.nl\/en\/blog\/addressing-meltdown-and-spectre-vulnerabilities\/"},"author":{"name":"Mark Kraakman","@id":"https:\/\/hosting.nl\/en\/#\/schema\/person\/22ba9dfdfb0dd056274cec0357468cc8"},"headline":"Addressing Meltdown and Spectre vulnerabilities","datePublished":"2018-01-04T11:35:55+00:00","dateModified":"2026-01-23T14:24:09+00:00","mainEntityOfPage":{"@id":"https:\/\/hosting.nl\/en\/blog\/addressing-meltdown-and-spectre-vulnerabilities\/"},"wordCount":237,"publisher":{"@id":"https:\/\/hosting.nl\/en\/#organization"},"image":{"@id":"https:\/\/hosting.nl\/en\/blog\/addressing-meltdown-and-spectre-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/hosting.nl\/wp-content\/uploads\/Meltdown_SQR_740x400.jpg","articleSection":["Nieuws"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/hosting.nl\/en\/blog\/addressing-meltdown-and-spectre-vulnerabilities\/","url":"https:\/\/hosting.nl\/en\/blog\/addressing-meltdown-and-spectre-vulnerabilities\/","name":"Addressing Meltdown and Spectre vulnerabilities | Hosting.NL","isPartOf":{"@id":"https:\/\/hosting.nl\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hosting.nl\/en\/blog\/addressing-meltdown-and-spectre-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/hosting.nl\/en\/blog\/addressing-meltdown-and-spectre-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/hosting.nl\/wp-content\/uploads\/Meltdown_SQR_740x400.jpg","datePublished":"2018-01-04T11:35:55+00:00","dateModified":"2026-01-23T14:24:09+00:00","breadcrumb":{"@id":"https:\/\/hosting.nl\/en\/blog\/addressing-meltdown-and-spectre-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hosting.nl\/en\/blog\/addressing-meltdown-and-spectre-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hosting.nl\/en\/blog\/addressing-meltdown-and-spectre-vulnerabilities\/#primaryimage","url":"https:\/\/hosting.nl\/wp-content\/uploads\/Meltdown_SQR_740x400.jpg","contentUrl":"https:\/\/hosting.nl\/wp-content\/uploads\/Meltdown_SQR_740x400.jpg","width":740,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/hosting.nl\/en\/blog\/addressing-meltdown-and-spectre-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Hosting.NL","item":"https:\/\/hosting.nl\/en\/"},{"@type":"ListItem","position":2,"name":"Addressing Meltdown and Spectre vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/hosting.nl\/en\/#website","url":"https:\/\/hosting.nl\/en\/","name":"Hosting.NL","description":"","publisher":{"@id":"https:\/\/hosting.nl\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hosting.nl\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/hosting.nl\/en\/#organization","name":"Hosting.NL","url":"https:\/\/hosting.nl\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hosting.nl\/en\/#\/schema\/logo\/image\/","url":"https:\/\/hosting.nl\/wp-content\/uploads\/hostingnl-default-logo.png","contentUrl":"https:\/\/hosting.nl\/wp-content\/uploads\/hostingnl-default-logo.png","width":242,"height":50,"caption":"Hosting.NL"},"image":{"@id":"https:\/\/hosting.nl\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hosting.nl\/en\/#\/schema\/person\/22ba9dfdfb0dd056274cec0357468cc8","name":"Mark Kraakman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hosting.nl\/wp-content\/litespeed\/avatar\/b77879d685fc20c1b8a18112389c8ffa.jpg?ver=1776945508","url":"https:\/\/hosting.nl\/wp-content\/litespeed\/avatar\/b77879d685fc20c1b8a18112389c8ffa.jpg?ver=1776945508","contentUrl":"https:\/\/hosting.nl\/wp-content\/litespeed\/avatar\/b77879d685fc20c1b8a18112389c8ffa.jpg?ver=1776945508","caption":"Mark Kraakman"},"url":"https:\/\/hosting.nl\/en\/blog\/author\/mark-kraakman\/"}]}},"_links":{"self":[{"href":"https:\/\/hosting.nl\/en\/wp-json\/wp\/v2\/posts\/28295","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hosting.nl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hosting.nl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hosting.nl\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/hosting.nl\/en\/wp-json\/wp\/v2\/comments?post=28295"}],"version-history":[{"count":2,"href":"https:\/\/hosting.nl\/en\/wp-json\/wp\/v2\/posts\/28295\/revisions"}],"predecessor-version":[{"id":42170,"href":"https:\/\/hosting.nl\/en\/wp-json\/wp\/v2\/posts\/28295\/revisions\/42170"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hosting.nl\/en\/wp-json\/wp\/v2\/media\/25790"}],"wp:attachment":[{"href":"https:\/\/hosting.nl\/en\/wp-json\/wp\/v2\/media?parent=28295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hosting.nl\/en\/wp-json\/wp\/v2\/categories?post=28295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hosting.nl\/en\/wp-json\/wp\/v2\/tags?post=28295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}