Techniques such as extracting operating parameters, comparing application profiles across VMs (to look for signs that one has been successfully attacked), and analyzing application behavior in memory (as opposed to just code stored on disk) are far easier in a virtual environment and provide a huge advantage for stopping the most sophisticated threats.
These adversaries include people hurt by his behavior and subsequent lies about his behavior, people whom Armstrong attacked and bullied for calling him out on his illegal and reprehensible activities, people who love competitive sports, and individuals with cancer who relied on Livestrong, the anti-cancer non-profit organization which he founded.
Pisatorius' behavior Thursday reflected the change of mood in the courtroom as his defense lawyers attacked police procedures and maintained his innocence.