Presentations
- 2018: InfoSec World (Impact of Scale on Security), Tech Field Day Austin, Dallas VMUG, VMworld vBrownbag Tech Talks (Security 201, Data Flow Through the Hypervisor and Beyond)
- 2017: DELL EMC World vBrownbag Sessions, VMworld Opening Acts, VMworld SER1361BU, VMworld vBrownbag Tech Talks (Hacking Public Speaking)
- December 4, 2016, LISA16, Hybrid Cloud Reference Architectures Workshop
- VMworld 2016 vBrownBag Tech Talks (TVP Strategy Panel, Continuous … well Everything!)
- April 4, 2016, InfoSec World, A Model for Moving Securely to the Cloud
- July 2016, vBrownbag US, Building ERK Stack using Log Insight & Elastic Search
- January 19, 2016, vBrownBag Sessions: Adding Security into Agile Cloud Development
- December 17, 2015, Commitmas vBrownBag Session: Git Security Workflow – Ensure Confidential Data Not Shared
- October 14-16, 2015, DynaTrace Perform Hallway Session, Secure Agile Cloud Development with Operations Management for Ixia
- 2015, Austin VMUG
- 2015, VMworld vBrownBag Sessions
- May 19, 2015, Cloud Security World, Secure Hybrid Cloud Workshop (all day course delivery)
- 2014, Providence VMUG
- 2014, VMworld vBrownBag Sessions
- April 7-9, 2014, InfoSec World – Cloud Security Summit
- 2013, Wisconsin VMUG, How to Use the vSphere Hardening Guide
- 2013, InfoSec World – Cloud Security Summit
- 2013, Big Data Security Conference
- February 21, 2012, RSAC2012 Podcast: STAR-302: Large Scale Cloud Forensics
- August 10, 2011, Face-off: Is VMware Tools worth the virtual security risks?
- Veeam Podcast, Episode 31 – Simple steps to physical security
- May 19, 2011, TakeDownCon Dallas 2011, Where is my data? Data flow through the hypervisor
- April 14, 2011, Chinwag with Mike – Edward Haletky [Episode 51]
- April 13, 2011, VCP BrownBag by Cody Bunch BrownBag Follow-Up vSphere Security with Ed Haletky
- Veeam Podcast, Episode 7 – Penetration Testing with Virtual Backups
- November 22, 2010, IBM Institute for Advance Security Virtualization Security Webcast
- October 28-29, 2010, CSI 2010 Presenting on the Low Hanging Fruit of Virtualization Security
- October 13-15, 2010 Hacker Halted 2010 Presenting on Virtualization Security, and participating in Cloud Debate.
- August 30-Sept 4th, VMworld 2010: Tech Exchange: PPC-07 vGhetto – Communities Building Great Solutions
- August 30-Sept 4th, VMworld 2010: SE8371:Securing Government Virtual Environments
- August 27, 2010 VIRTUMANIA 24 – Trouble shooting VDI with Xangati
- * August 25, 2010 – BrightTalk – Secure the Cluster NOT Just the Host!
- July 12, 2010 VIRTUMANIA 19 – Security Is the Dark Side of Virtualization
- June 22, 2010 BrownBag #10 – Security Deep Dive
- April 22, 2010 Summit on Secure Virtualization and Cloud Computing Presenting Keynote: The Future of Virtualization Security, Technology and Solutions Spotlight: Separating Hype from Reality Panel w/Michael Berman (Catbird), Todd Ignasiak (Altor), Hemma Prafullchandra (HyTrust), and Mike Wronski (Reflex)
- March 1-5, 2010 RSA Conference 2010 Presenting END-402: Console vs. Console-less Hypervisors: A Security Review
- March 1-5, 2010 RSA 2010: How do you secure 14,000 virtual machines on 512 servers?
- March 1-5, 2010 If you’re going for PCI compliance, just shut up and log
- February, 2010 Server colocation vs. segmentation for test and dev, production
- January 15, 2010 – 3rd Annual WOW! Event — Measuring Hypervisor Footprints: Assessing Risk
- December 9, 2009 – InformationWeek’s Dark Reading and Black Hat, Panel Session, Virtualization, Cloud Computing, and Next Generation Security
- September 20-25, 2009 HackerHalted — Security of Virtualization as a Service: The Key to Cloud Security, Hardening & Securing Linux, Co-Presented w/Tim Pierson Virtualization Security: Threats Exposed
- July 16, 2009 PowerScripting PodcastDownload Podcast
- June 30, 2009 BrightTalk EC Council Security Channel – Virtualization: Are you Secure Enough? Prelude to Hacker Halted Virtualization Security Course.
- June 22-26, 2009 Techmentor — WS4 – Real World Solutions for Hardening the ESX/ESXi Host, T4 -VDI: Do you Really Need It?, T8 – Securing Every Part of Your Virtual Environment.
- May 20, 2009 BrightTALK Cloud Computing Summit
- May 06, 2009 Securing Automated Virtual Machine Deployments
- Securing the Virtual Environment for ComputerWorld Virtualization Directions online Conference
- VMworld 2008Ask an Expert Panel
- Virtualization’s Disaster Plan: How the technology can improve disaster recovery for SMBs
- Tips/How-tos/Articles for SearchVMware and SearchServerVirtualization
- eWeek How to Attach Local Tape Device to VMware ESX Host
- VMprofessional.com Comparison of VI3 Backup Tools
- Planning Primer: Benchmarking, Virtualization Review, July/August 2008, pp 39-41.
- Virtualization Tour 2006
- VMTexas 2005
- Monitoring, Auditing and Securing ESX
- Troubleshooting VMware ESX (Q & A)
- Disaster Recovery and ESX
Books and Papers
- Virtualization and Cloud Security Video and Podcast
- VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers, 2nd Edition, February 2011, Copyright 2011 Pearson Education.
- VMware vSphere(TM) and Virtual Infrastructure Security: Securing the Virtual Environment, July 2009, Copyright 2008 Pearson Education.
- Planning Primer: Benchmarking, Virtualization Review, July/August 2008, pp 39-41.
- Comparison of VI3 Backup Tools, VMprofessional.com, March 2008, web. Copyright Edward L. Haletky.
- VMWare ESX Server in the Enterprise: Planning and Securing Virtualization Servers, December 2007, Copyright 2008 Pearson Education.
- Deploying Linux on the Desktop, Elsevier, Burlington, Massachusetts, 2005.
- The Dark Side techliving: Your Hassle-Free Way to Live, July/August 2004, pp 70-71.
- Nice Rack! Home Automation: The How-To Guide for Home Technology, March 2004, pp 28-31.
- Persistent Linux with User-Mode Linux. SysAdmin: The Journal for UNIX System Administrators, May 2004, pp 42-46.
- Setting up for Forensics. UnixReview.com, July 2003, web.
- Beowulf Batch Processors and Job Schedulers. SysAdmin: The Journal for UNIX Systems Administrators, Summer 2003, pp. 13-17.
- Home Control Home Automation: The How-To Guide for Home Technology, Buyer’s Guide 2003, pp 10-11.
- Testing an iptables Firewall from within the Host. SysAdmin: The Journal for UNIX Systems Administrators, July 2003, pp. 40-43.
- Go Wireless! Home Automation: The How-To Guide for Home Technology, July 2003, pp 54-55.
- Mastering the Mess. Home Automation: The How-To Guide for Home Technology, July 2003, pp 42-43.
- A Fan of Fans. Home Automation: The How-To Guide for Home Technology, May 2003, pp 42-43.
- Spotlight on Security. Home Automation: The How-To Guide for Home Technology, March 2003, pg 60.
- Easy Access. Home Automation: The How-To Guide for Home Technology, March 2003, pp 42-43.
- Proactively Protecting VPN with Nessus. SysAdmin: The Journal for UNIX Systems Administrators, March 2003, pp. 33-37.
- Total Control: Which remote best keeps you in the driver’s seat? Home Automation: The How-To Guide for Home Technology, January 2003, pp 32-33.
- The Next Wave: Philips Pronto Pro (TSU6000). Home Automation: The How-To Guide for Home Technology, January 2003, pg 21.
- Wired for Sound. Home Automation: The How-To Guide for Home Technology, November 2002, pp. 46-47. Listed under Contributing Writers p. 5.
- Wiring a whole-house phone line surge protector: Perfect Protection. Home Automation: The How-To Guide for Home Technology, July 2002, pp. 46-47.
- Integrating Backup for a Multiple Operating System Network with Amanda. SysAdmin: The Journal for UNIX Systems Administrators, April 2002, pp. 4, On the Web section.
- Integrating Macintosh Computers into Your Network. SysAdmin: The Journal for UNIX Systems Administrators, November 2001, pp. 41-44.
- The Unwalled City. Weekly Radio Broadcast, WALE, March 26, 2001 – June 18, 2001.
- Interviewed for Retrofit Case Study: Expect the Unexpected. Electronic House, June 2000, pp 46-47.
- Does the X Window System Provide Portability? Xhibition ’94 Conference Proceedings, June 1994, pp. 77-97.
- NPGL vs. IBM GL. RS/Magazine, June 1994, pp. 50-53.
- X and Signals. RS/Magazine, July 1993, pp. 37-40.
- Calling C Functions from FORTRAN Modules. AIXpert, February 1993, pp. 46-49.
- The Design and Use of GL Widgets. AIXpert, August 1992, pp. 4-11.
- Another Input Model within the X Window System. Xhibition ’92 Conference Proceedings, Volume 1, June 1992, pp. 111-119.
- Integration of GL with the X Window System. Xhibition ’91 Conference Proceedings, June 1991, pp. 105-113.
Interviews and References
- Oracle’s Java virtualization support policy reignites controversy
- Reduce virtualization security risks by thinking physical, experts say
- VMware users hope PXE Manager isn’t just a fling
- VMware vShield Manager design raises availability concerns
- vDestinations Top 5 VMware Books List
- Data security worries rise as virtualization spreads
- Disaster recovery solutions for virtual environments run the gamut
- EMC-Brocade 10 Gigabit Ethernet deal raises questions for Cisco
- Experts dish on standout features of Cisco’s UCS
- Interview by Simon Seagraves of Techhead
- Hypervisor Huddle Podcast
- Evolving Solutions – Data Center Leaders: VMware Virtualization With AstroArch Founder & Author Edward L. Haletky
- Referenced by Chris Orr at Tripwire Blog – Sometimes the Pirate is you…Virtualization Security includes the host too you know…
- SearchServerVirtualization – Virtual machine security enters the mainstream
- VirtualizationReview – Brave New World: VDC-OS
- RemondMag.com – Back to the (Virtual) Future
- InternetNews.com – Microsoft Backtracks on Live Migration, Again article.
- Interview by Eric Sloof at VMworld 2008
- VMworld Community Experts Session
- Citi’s Software Conference Call Series
- ComputerWorld Canada (requires login) – Virtual servers not always safe article.
- InternetNews.com – VMware may be Hit Hard by Hypervisor Error article.
Other Blogs
- The Virtualization Practice
- Virtualization Pro: A SearchVMware.com
- Sun xVM VirtualBox vs. VMware Workstation
- What to expect at VMworld
- Monitoring vSphere adoption: A forum moderator’s perspective
- Should you upgrade to VMware vSphere 4?
- VMware vSphere is available: Now what do you do?
- The Plus in vSphere 4.0 Enterprise Plus licensing: Percolating thoughts
- The cycles of VMware communities forums: Search is your friend
- VMware vSphere licensing commentary and FUD
- Using an iPhone to fix an ESX server while on vacation
- VMware vSphere may require a hardware upgrade
- Must-have VMware infrastructure plug-ins
- VMware Tools FAQ
- Three new tools for the VMware toolbox
- VMware ESX shared disk clusters: Microsoft Cluster Server, Linux, etc.
- VMware HA Failure Got You Down?
- My virtualization toolbox
- Hypervisor performance testing
- VMware vCenter for Linux tech preview disappointing
- Attenting VMworld Europe 2009… virtually
- PowerShell for Windows and Linux developers
- VMware ESX storage: How to get local storage to act as a raw disk for VMs
- New VMware ESX v3.5 U8 vulnerabilities
- VMware Workstation vs. Sun VirtualBox: Workstation wins
- The VMware vExpert Awards are here
- Useful VMware virtualization roundtable podcasts
- Solution for VMware Player security vulnerability
- Why you shouldn’t restore VMware ESX from a backup
- Virtualization administrator holiday wishlist
- Understanding VMware Infrastructure Client Connectivity
- Top VMware security links
- Understanding VMware ESX security zones
- Security outside the box
- Secure method to P2V across security zones
- Replacing a VMware ESX SAN
- VMware ESXi security review: Firewall, please
- Google and Microsoft creating virtualized cloud computing data centers
- VMware’s Bluelane purchase a move to true VDC-OS
- Cisco Subnet – Blue Gears – Virtual Networking – vNetwork w/DMZ Topology Series
- Blue Gears – DMZ w/6 Physical NICs with VMware ESX
- Blue Gears – DMZ w/5 Physical NICs with VMware ESX
- Blue Gears – DMZ w/4 Physical NICs with VMware ESX
- Blue Gears – DMZ w/3 Physical NICs with VMware ESX
- Blue Gears – DMZ w/2 Physical NICs with VMware ESX
vNetwork Topology Series
- Blue Gears – 8 Physical NICs with VMware ESX
- Blue Gears – 6 Physical NICs with VMware ESX
- Blue Gears – 5 Physical NICs with VMware ESX
- Blue Gears – 4 Physical NICs with VMware ESX
- Blue Gears – 3 Physical NICs with VMware ESX
- Blue Gears – 2 Physical NICs with VMware ESX
General vNetwork Series
- ITworld – Blue Gears
VMware Best Practices Series
- VMware HA with ESX v3.5 Update 3
- VMware HA failed with error….
- SVMotion Usage and Trials
- Understanding VMware EVC
VMworld Series
VMware VirtualCenter Series
- Allowing VMware ESX Private Virtual Networks to Migrate
- Booting VMware VirtualCenter while AD is unavailable
Forensics Series
- DABCC Analysis
- CIO IT Drilldown on Virtualization
- VMware Products May Take Time, But IT Teams Should Integrate Immediately
- vApps May Ease App Migration, But Require Closer Security Scrutiny
- VMware Answers Virtual Security Questions With VMsafe Details
- VMware Innovations Aren’t As Thick As They Should Be, But Impressive Nevertheless
- VMware Chief Redefines Virtualization, But Doesn’t Make Case for Real Innovation
- As Key Leaders Exit, Has VMware Lost its Innovation Edge?
- VMware Install-Everywhere Routine Leaves Users Frustrated When it Won’t Run
- Do VMware SDK License Limits Make Third-Party Developers Into Outlaws?
- How Secure is Hyper-V, Really?
- How to Recover From Virtualization Disasters
- Antivirus Policies Remain Contradictory for VMware ESX and ESXi
- More Adventures with VMware Update 2
- Virtual Appliances Cause Software License Confusion
- VMware Bug is Worse Than a Glitch To Users Who Depend on It
- VMware and SSL Settings: How to Stay Safe
- VMware’s Free ESXi Will Cost You if it’s Not Secured Properly
- VMware webAccess Man-in-the-Middle Vulnerability and How to Dodge It
- Pros and Cons of VMware’s New Security Guide
- Virtual Server Investigations: VM Forensic Tools Remain MIA
- Are Virtual Firewalls a Real Solution for VM Security?
- VMware Appliance is Convenient, But Don’t Assume It’s Secure
- Federal Security Guide for VMware ESX Helpful: But Has Holes
- VMware’s ESX Hardening Guideline Falls Far Short of ‘Secure’
- CISecurity Guide to VMware Security Falls Far Short
- Good Virtual Security Requires Better IT Teamwork
- VMs You Can’t See Can Definitely Hurt You
- Virtual Networking Best Practices Up for Debate
- SMB Installs Show Virtual Servers Have Come of Age
- Virtualization Security Assessment Guides Inadequate Tools Lacking
- Backing Up VMware: Don’t Use the Obvious Solution
- Can Virtualization Improve Security
- Software Licensing and VMs: Watch The Costs
- Virtual Servers in the DMZ Pose Security Risks
- Virtual Desktop Infrastructure A concept more than a Product
- Threats Lurk Outside Open Doors in Virtual Infrastructure
- Today’s Virtualization Security Tools: One Hidden Risk
- Monitoring Virtual Infrastructure Problem’s Lack of Knowledge Not Tools
- The Problem with Bolt On Security for Virtual Environments