Virtualization and the physical security boundary
There are several laws of information security. Ask ten InfoSec pros and you will likely get ten different lists of laws, but I wager every one of them will agree on a couple fundamentals. If an...
View ArticleBuilding our own cloud
I have been thinking a lot about IT service architecture. After all, my theme this year is "Security is Design". How can we maximize the benefits of new technologies while minimizing the security...
View ArticleMatriux - Penetration Testing from Hyper-V
Matriux is a vulnerability assessment / penetration testing Linux distribution. The team's beta release was the beginning of this month, and I have been playing around with the distro for the past...
View ArticleMatriux - Downgrade to 2.6.18 and install Hyper-V's integration components
These steps will install Matriux into a Hyper-V vm (2008 or 2008 R2) and integrate the mouse, network adapter, and storage adapter.Create a Hyper-V vm with the legacy network adapter and a 10 GB...
View ArticleMatriux - Upgrade to 2.6.32-7 and install the GPL Hyper-V integration
These steps will install Matriux into a Hyper-V vm (2008 or 2008 R2) and integrate the network and storage adapters.Create a Hyper-V vm with the legacy network adapter and a 10 GB vhd.Download Matriux...
View ArticleCost justifying 10 GbE networking for Hyper-V
SearchSMBStorage.com has an article on 10 GbE. My team gets a mention. The link is below and on my Press mentions page.For J. Wolfgang Goerlich, an IT professional at a 200-employee financial services...
View ArticleCloud adoption and use
I am tremendously in favor of virtualization, a staunch proponent for cloud computing, and I’d automate my own life if I could. After all, we dedicated most of last year to investigating and piloting...
View ArticlePrivate Cloud ROI
When and how does private cloud computing pay for itself? What is the return? I recently spoke with Pam Baker (@bakercom1) about this topic. Check out Pam's article in The IT Pro: Cloud ROI: How much...
View ArticlePrivate cloud computing case study
We stood in the data center. Team meeting. On the screen, a knowledge sharing presentation. As we flipped thru the project status for storage virtualization and server virtualization, we were feeling...
View ArticleAttacking hypervisors without exploits
The OpenSSL website was defaced this past Sunday. (Click here to see a screenshot from @DaveAtErrata on Twitter.) On Wednesday, OpenSSL released an announcement that read: "Initial investigations show...
View Article