I spoke on the Virtual Stack podcast, episode 5, about the #NSX Distributed firewall #vexpert

On the heels of my VNSTechcon session, today I had a great time talking to Emre Girici on his podcast about the same topic: NSX Distributed firewall. This talk has an introductory flavor to the topic of Micro-segmentation with NSX, and I hope to zoon in further on it in future conversations with Emre. Embedded above,
Read More »

#vNSTechcon a great success. Video of my session and slides on #NSX #microsegmentation in practice #vexpert

I had the great privilege of being part of the team that organised the first dutch vNSTechcon.  (Networking and Security technical conference) Together with our sister event, the vMATechcon (Management and Automation), combined with great help from VMware and a kick-ass location, we had 2 really great days of excellent content and networking. We had
Read More »

1st Nov. I will be speaking on #NSX #micro-segmentation in practice at the Infosecurity Expo #vexpert

1st of November at 13:00 I will be speaking at the SecurityInfo / Data & Cloud Expo about our experiences with NSX micro-segmentation https://www.infosecurity.nl/seminar/X103 https://www.dncexpo.nl/seminar/X103 In this 45 min talk I will discuss  the details of managing micro-segmentation with the VMware NSX Distributed Firewall function. Does it live up to the promise, what are the pitfalls
Read More »

vCenter rights needed for Docker-Machine vSphere Driver

There are many ways to quickly provision docker hosts to cloud infrastructures. Dockers own native way is to use docker-machine. Being a vSphere admin I was of course interested in the VMware vSphere driver for docker-machine. The starting resources for this are: https://docs.docker.com/machine/drivers/vsphere/ https://blogs.vmware.com/cloudnative/how-to-use-docker-machine-in-conjunction-with-vsphere-driver/ While I got this working, one of the issues I struggled
Read More »

Slow boot time on Veracrypt

Re-encrypting my work laptop harddrive. Veracrypt is the successor to Truecrypt and its code has been community-vetted to insure there are no ‘back doors’ in it (and its security can be independently verified). The only downside it has is that by default, it uses a rather high header key derivation iteration value (a lot higher
Read More »