Edwin Weijdema
Why using .local as your domain name extension is a BAD idea!
The special-purpose .local top-level domain (TLD) is not designed for use in the global Domain Name System (DNS). Rather, multicast DNS (mDNS) uses it to resolve hostnames to IP addresses within small networks, eliminating the need for a dedicated DNS server. Specifically, mDNS operates on…
Selecting a new Password Manager
I am also one of those users that used LastPass until a few days ago with full satisfaction. A breach can happen to anyone, but by leaving customers in the dark and exposed is especially worrying. By not giving insight who, what and where customers…
Hardening – VM Security
The last decade virtualization has been rapidly adopted by almost any organization in the world and became a standard industry practice. You may deploy Veeam Backup & Replication components as either a physical or virtual server. For most organizations, virtual is the recommended deployment for…
Hardening – Infrastructure Security
Hardening the Infrastructure Security are the security measures provided to protect the infrastructure, especially critical infrastructure. While looking into the infrastructure a lot of organizations have already a high rate of virtualization established. Hypervisor hosts are critical infrastructure components at almost any organization, because a…
Hardening – Segmentation
Ultimately, all security is about protecting a valuable asset and reducing risk – in this case it is Data – but that protection involves a defence-in-depth strategy that includes all layers. To do a defence-in-depth, you should identify the most valuable data and build layers of defence…
Hardening – Hardware Security
To prevent outside interference and tampering with the physical hardware several measures should be taken into consideration. By taking the correct measures ensures that you can trust your deployed computing platform, and it adds security to server hardware and operating systems from the moment you…
Hardening – Physical Security
It is essential that only authorized personnel have physical access to the datacenter. Data centers hold sensitive and crucial information and services. Software-based protections on your server(s) become far less effective or even useless as soon as an attacker gains physical access! Access into a…
Infrastructure Hardening
Cyber Security is something nobody can afford to ignore anymore. Hacks and data breaches regularly affect organizations of all sizes. Often these incidents are significant enough to make the front pages, causing irreparable reputational damage to the organizations involved. Keeping today’s digital assets available 24/7…
How to create a mobile lab with VMware Fusion
I am going to setup a mobile lab on my MacBook Pro with the help of VMware Fusion 12 so I can run some ESXi servers with nested virtualization. This way I will have a lab I can carry around with me on my travels…
Using VMware and Veeam? Update VBR 9.5 to Update 3a now
Veeam just released their latest update for Veeam Backup & Replication 9.5 Update 3a with lots of support for new VMware platform versions! Are you already running or planning to update to VMware vSphere 6.5 Update 2 or vSphere version 6.7? Make sure you update…