Replaced certificates and get vSphere HA Agent unreachable?
Replaced certificates and get vSphere HA Agent unreachable? I have heard this multiple times in the last couple of weeks. I started looking in to it and it seems that in many of these scenarios the...
View ArticleCreating a Baseline for Small Business
In my last blog ‘To Cybercriminals, The Size of a Company No Longer Matters” I discussed the fact that the latest PwC Information Security Breaches Survey 2013 shows that there has been a significant...
View ArticleHow to change the IP Address of ESXi through the commandline
I was building out my virtualized lab and instead of re-installing ESXi over and over again I figured I would just quickly clone them. Now of course this leads to a “minor” problem as the virtualized...
View ArticlePinging from different VMkernel NICs using esxcli?
Today I had a network issue in my lab, I still don’t have a clue what the issue was but I did discover something useful. I had 3 different VMkernel’s setup and I wanted to make sure each of the three...
View ArticleFree Kindle copy of vSphere 5.0 Clustering Deepdive?
Do you want a free Kindle copy of the vSphere 5.0 Clustering Deepdive or the vSphere 4.1 HA and DRS Deepdive? Well make sure to check Amazon next week! I just put both of the books up for a...
View ArticleIntroducing The SBIC Blog — Strategic Guidance from Global Security Executives
By Laura Robinson, SBIC Chair Imagine if you had regular access to a group of top-notch advisors – security leaders from global brand-name companies – to help you build your security strategies?...
View ArticleWith Liberty Reserve Down, What’s In Store for Cybercriminals Now?
With Liberty Reserve being taken down and its owner arrested, many fraudsters now find themselves having to recuperate from substantial financial losses. As the e-currency service was to the...
View ArticleNew Commercial Trojan #INTH3WILD: Meet Beta Bot
By Limor S. Kessem, Cybercrime and Online Fraud Communications Specialist, RSA It appears that a much anticipated event has finally transpired in the cybercrime arena, with the release and active sale...
View ArticleImplementing Advanced Authentication to Satisfy CJIS Security Policy...
IT Director Lesley Chaney of New Hanover County North Carolina joins the Speaking of Security Podcast to talk about her experience with the newly updated Criminal Justice Information Systems (CJIS)...
View ArticlePaul Maritz Explains Pivotal
One of the more memorable sessions at this year's EMC World was when Paul Maritz took the stage right after Joe Tucci to walk through the rationale and motivations behind Pivotal. I'm sure more than a...
View ArticleEMC’s VNX = Award Winning storage for Microsoft environments
Microsoft’s TechEd 2013 is next week, and I’m looking forward to spending time with my longtime industry friends and making some new connections on the show floor in New Orleans. This year, I’ll...
View ArticleManual vMotion and using DRS to select a host results in no migration?
I had a question from a customer last week. He was doing a manual migration on a cluster which had DRS enabled. He was using the vSphere Web Client and was wondering if he should tick the “Allow host...
View ArticleGroove Theory of GRC – Postulate #3: The Creative Process
In my last blog post, I talked about the importance of building collaboration across the organization to bring the greatest value to your GRC program. For this blog, I am borrowing a piece of wisdom...
View ArticleIs IT Growing Up?
Kids grow up, if you're lucky they eventually get a job and settle down, looking very much like their parents did at a similar age. By the way, they dislike it when you point this out. Industries grow...
View ArticleGRC Driving School: Avoiding Control Blind Spots
by Mason Karrer Remember driver education class when the instructor would sound like a broken record telling you to look over your shoulder to check the “blind spot” before changing lanes? Never mind...
View ArticleAction Plan for Small Enterprises
In my last blog we created a security baseline to help organizations adequately protect sensitive data. While this series has been focused on guidance for smaller companies, the basic principles can...
View ArticleProject Serengeti: Hadoop Infrastructure Made Easy
An increasing number of IT groups are finding themselves adding one or more Hadoop clusters to the mix. Project Serengeti virtualizes Hadoop clusters, making them easier to deploy and easier to...
View ArticleTrain Signal free trial for new subscription model
Recently Train Signal changed the way they deliver training… Instead of buying a single training every time they changed to a subscription based model. It makes a lot of sense if you ask me. I always...
View Article2013 RSA Archer Summit
By Andy Weeks, Director of Enterprise Solution Point, Humana The 10th RSA Archer GRC Summit is rapidly approaching, and I would like to take a moment to share some details with you about what is...
View ArticleEvaluating SSDs in Virtualized Datacenters by Irfan Ahmad
Flash-based solid-state disks (SSDs) offer impressive performance capabilities and are all the rage these days. Rightly so? Let’s find out how you can assess the performance benefit of SSDs in your...
View Article