Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/2 Why Citrix is the most complete EUC platform (Citrix) Enterprises need a solution that addresses today’s challenges and prepares them for tomorrow. Citrix delivers by continuously enhancing our platform with features that improve performance, security, and management. https://www.citrix.com/blogs/2026/01/26/why-citrix-is-the-most-complete-euc-platform/ Microsoft fixes Outlook bug blocking access to encrypted emails Microsoft has fixed a known issue that prevented Microsoft 365 customer... read more.

  • February 06, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In Back to the Future, time is everything. Doc Brown’s DeLorean time machine relies on precise synchronization to travel to specific moments in history. A miscalculation of even a few seconds could mean arriving in the wrong year, or worse, the wrong timeline. In cybersecurity, time synchronization isn’t about time travel, but it’s just as critical. CIS Safeguard 8.4 emphasizes the need to... read more.

  • February 04, 2026

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/26 A strong EUC and cloud strategy isn’t one-size-fits-all. It’s about identifying the solutions that make the most sense for your business. Gotham delivers tailored EUC solutions that align directly with your business objectives, driving productivity, security, and scalability. If you are a current Gotham customer contact your Gotham rep or if you are new to us please contact our Business Development Representative Sierra Birmingham for a link to the full webinar where Gotham’s... read more.

  • January 30, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In Ridley Scott’s The Martian, astronaut Mark Watney is stranded on Mars with limited resources and a damaged habitat. His survival hinges on one critical principle: identify problems quickly and fix them immediately. Whether it’s sealing a breach in the Hab or hacking together a communication system, Watney must detect issues and remediate them immediately for his survival. This is the essence... read more.

  • January 27, 2026

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/19 The Continuing Risk of Remote Code Execution (Arctic Wolf) Remote code execution gives the attacker the ability to take control over a process or device and run their own code remotely. Notable RCE attacks and how to defend against it. https://arcticwolf.com/resources/blog/the-continuing-rise-of-remote-code-execution/ Microsoft releases OOB Windows updates to fix shutdown, Cloud PC bugs Microsoft has released multiple emergency, out-of-band updates for Windows 10, Windows 11, and Windows Se... read more.

  • January 23, 2026

By Gotham, Posted in Infrastructure

Written with contributions from Brian Wagner, Practice Director - EUC and Cloud, Ryan Lee, Senior Solutions Architect, Gotham Technology Group, and Dean Cefola, Principal Technical Marketing Manager, Nerdio. Windows 365 offers a predictable, per-user monthly pricing model that simplifies cloud VDI budgeting. However, without proper oversight, costs can escalate due to over-provisioned resources and underutilized licenses. Proactive cost management is essential to maximize your return on inve... read more.

  • January 19, 2026

By Gotham, Posted in Infrastructure

Written with contributions from Brian Wagner, Practice Director - EUC and Cloud, Ryan Lee, Senior Solutions Architect, Gotham Technology Group, and Dean Cefola, Principal Technical Marketing Manager, Nerdio. Windows 365 offers a predictable, per-user monthly pricing model that simplifies cloud VDI budgeting. However, without proper oversight, costs can escalate due to over-provisioned resources and underutilized licenses. Proactive cost management is essential to maximize your return on inve... read more.

  • January 19, 2026

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/12 Attackers Move into Microsoft Teams: Automated Remediation for Lateral Threats (Abnormal AI) Attackers increasingly rely on collaboration tools like Microsoft Teams because they move fast and operate on implicit trust. Automated detection and remediation changes that dynamic by addressing malicious messages as they appear—before users have a chance to interact and before threats can propagate across chats and channels. https://abnormal.ai/blog/microsoft-teams-automated-remediation Nuta... read more.

  • January 16, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In Jurassic Park, the electric fences surrounding the dinosaur enclosures were the first line of defense. They were designed to keep threats contained and protect the outside world. But when those fences failed—due to poor maintenance and lack of monitoring—the consequences were catastrophic. This is the perfect analogy for CIS Safeguard 7.6, which emphasizes the importance of automated vulnerab... read more.

  • January 14, 2026

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/22 Eon Cloud Backup: Transforming Data Protection for Modern Businesses Eon Cloud Backup feels like an SDWAN for Backup. It delivers management and data planes across hyperscalers, abstracting each platform’s functions and capabilities into an easily manageable and highly automated solution. By leveraging underlying infrastructure, Eon creates a system that truly is greater than the sum of its parts. https://www.gothamtg.com/blog/eon-cloud-backup-transforming-data-protection-for-modern-bu... read more.

  • January 09, 2026