Blog Archives

Edward Haletky
Edward HaletkyEdward L. Haletky, aka Texiwill, is the author of VMware vSphere(TM) and Virtual Infrastructure Security: Securing the Virtual Environment as well as VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers, 2nd Edition. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and The Virtualization Practice where he is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization. [All Papers/Publications...]

SecDevOps: What Security Can Do Today

July 30, 2014
By
agilecloud

On the June 24, 2014 Virtualization Security Podcast, we discussed SecDevOps with Andi Mann of CA Technologies. Andi pointed out fairly early that he does not like the term or the “DevOpsSec” term. Security needs to be considered at every step of the way, he stressed: neither before nor after Dev, but marching along with…

Read more »

When SaaS Goes Awry

July 25, 2014
By
CloudComputing

Recently, I have had a spate of calendar issues from various sources and of various types. Some calendar entries are given the wrong time zone, others show up on one device but not another, and some have no email capability embedded. All of these issues occur when various calendar services are used by those sending…

Read more »

Making Do: The SMB Perspective

July 16, 2014
By
SMBVirtualization

Small and medium business and enterprises often make do with what they can do today while dreaming about tomorrow. Most SMBs look to have communication tools in place both for communication with the outside world (email, the Web, Twitter, Facebook, Google+, etc.) and for communication between team members (email, IM, etc.). Most of this can…

Read more »

Disaster Recovery Communication

July 14, 2014
By
VirtualizationBackup

During a recent Twitter conversation about disaster recovery and business continuity testing, I began to consider how we communicate during a disaster. We do so not with normal communication methods, but more often than not with an interrupting form of communication—one in which constant requests for updates, criticisms, and outright demands for attention are directed…

Read more »

Security Wrapped Data

July 10, 2014
By
VirtualizationSecurity

On the July third Virtualization Security Podcast, we discussed mobile security with Harry Labana, CPO of CloudVolumes, and Ben Goodman of VMware. Actually, it was not necessarily about mobile security as much as it was about security in accessing corporate data from mobile devices, regardless of device and location of data. What came out of…

Read more »

Protecting ITaaS Consoles

June 24, 2014
By
ITasaService

There has been quite a bit written about Code Spaces and how unauthorized access to its ITaaS console granted enough permissions to delete everything out of Amazon, including backups. There are lessons here not only for tenants, but also for those vendors who create ITaaS consoles, such as VMware (vCHS, vCD, vCAC, vCenter, Orchestrator, etc.),…

Read more »

Lessons We Can Learn from the Code Spaces Attack

June 20, 2014
By
CloudComputing

It was all over the web on June 18: Code Spaces went off the air, as we discussed during the Virtualization Security Podcast on 6/19. The reasons are fairly normal in the world of IT and the cloud. They were hacked. Not by subverting the Amazon cloud, but in ways considered more traditional—even mundane. An…

Read more »

The Face of the New Backup

June 18, 2014
By
VirtualizationBackup

Backup, disaster recovery, and business continuity have changed quite a bit over the years, and they will continue to change into the future as more capability, analytics, and functionality are added to the general family of data protection tools. As we launch ourselves into the clouds, we need to perhaps rethink how we do data…

Read more »

Security Discussion: Backup and Scripting

June 9, 2014
By
VirtualizationBackup

During the last two Virtualization Security Podcasts, the panel discussed backups as well as scripting related to backups and in general. We went further to discuss the security implications surrounding backups, including whether or not a recovery is required when a site is hacked. The latter raises an important question: what constitutes a disaster that…

Read more »

Google Circle
Join my Circle on Google+

Plugin by Social Author Bio

Featured Solutions