Blog Archives

Edward Haletky
Edward HaletkyEdward L. Haletky, aka Texiwill, is the author of VMware vSphere(TM) and Virtual Infrastructure Security: Securing the Virtual Environment as well as VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers, 2nd Edition. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and The Virtualization Practice where he is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization. [All Papers/Publications...]

VMware and Xen VMs, not all that compatible

December 29, 2009
By

I have been doing some support work for an SMB that uses VMware Server where their VMs initially started as XenServer VMs, but due to networking and some other issues where converted to VMware VMs using V2V technology. However, these suddenly stopped working properly after an upgrade to VMware Server 2.

Read more »

SMBs in the Cloud require better Service Level Agreements than Enterprise Customers

December 23, 2009
By

Small Businesses live by there online presence these days specifically during the holiday shopping season. Many small business also do not have the IT staff to maintain such a presence with the agility required when problems occur. In addition, they may also lack the basic management, networking, security, and storage knowledge to properly maintain this…

Read more »

Does Virtualization Security take a New Way of Thinking?

December 17, 2009
By

I recently participated in the InformationWeek Dark Security Virtual Event as a panel member with Hoff, Craig Balding, Chris Wolf, Glenn Brunette, and Jon Oberheide. A very far ranging group of individuals from research, security organizations, analysts, and authors. What is interesting is that most of these same people have joined me on the Virtualization…

Read more »

PCI discussed on the Virtualization Security Podcast

December 16, 2009
By

The last Virtualization Security Podcast covered PCI, Kurt Roemer and Jeff Elliot who were guests represented PCI.  PCI as you hopefully know is working on compliance guidance for payment systems running within virtual machines and the cloud. This early discussion is a plea for people to get involved in reviewing the currently developing white-paper. While…

Read more »

Virtualization Related SSL MiTM Attack, chances?

December 9, 2009
By

There has been quite a bit of discussion between myself, Tim Pierson, and other with respect to SSL man-in-the-middle attack possibilities within the virtual environment. But what are the chances that such an attack will happen, or that someone would know how to perform the attack? What does the attack depend upon?

Read more »

V-Block: Is this the beginning of Hypervisors embedded in Hardware?

December 4, 2009
By

With the announcement of V-Block and Cisco UCS as a major component, is more hypervisor functionality going to end up in hardware? UCS adds some interesting features into the hardware that were traditionally within the purview of the hypervisor. Now it looks like V-Block is the assembly of myriad components that taken as a whole…

Read more »

VLANs/FCoE/CNA – Mixed Security Data on One Wire

December 2, 2009
By

Over the past year or so I have been thinking pretty heavily about the direction networking is taking within virtualization. In some ways, it appears security has been forgotten or relegated to 'encrypt' and forget. However, it takes quite a bit of knowledge and time to properly set up the backbone of an 'encrypt' and…

Read more »

NIST Cloud Computing Definitions Final

November 25, 2009
By

There has been great debate of what comprises the cloud, how to bound the cloud so that its easier to understand, and how to secure the cloud. Christofer Hoff of the Rational Survivabilty blog has been spear-heading quite a bit of discussion on cloud taxonomy in his attempts to wrap some thoughts around how to…

Read more »

Intrusion Protection and Detection within the Virtual Environment

November 18, 2009
By

Intrusion Protection Systems (IPS) differ quite a bit from Intrusion Detection Systems (IDS). An IPS is designed to modify some form of security setting when an intrusion is detected, thereby preventing the intrusion from being successful. An IDS on the other hand is just the detection component used by an IPS. Like all security tools…

Read more »

Google Circle
Join my Circle on Google+

Plugin by Social Author Bio

Featured Solutions