Blog

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In Independence Day (1996), Earth isn’t nearly destroyed because the aliens have better weapons—it’s because their technology is allowed to interface freely with human systems. Once malicious code is permitted to run, the damage is already underway. The turning point comes when access is restricted and assumptions are challenged. That same lesson sits at the heart of CIS Safeguard 9.6: Blo... read more.

  • May 05, 2026

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/27 The Network Perimeter Is Re-Emerging: What This Means for Modern SOCs (Adlumin) Organizations that optimized for a single layer of defense are finding themselves vulnerable to attacks they cannot even see. By examining the findings from the 2026 report, IT leaders can understand why this shift occurred, the risks of relying on isolated security tools, and how to build a unified strategy that stops modern threats. https://www.n-able.com/blog/the-network-perimeter-is-re-emerging-what-this-means... read more.

  • May 01, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In Catch Me If You Can (2002), Frank Abagnale successfully impersonates pilots, doctors, and lawyers—not by hacking systems, but by exploiting trust. People believe the uniform, the letterhead, and the signature. The deception works because there’s no reliable way to verify identity at a glance. Email spoofing works the same way. Messages look legitimate, appear to come from trusted senders, and... read more.

  • April 28, 2026

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/13 Mailbox rules in O365—a post-exploitation tactic in cloud ATO (Proofpoint) Mailbox rules are a high-risk post-exploitation tactic.?Attackers abuse native mailbox rules for exfiltration, persistence, and communication manipulation. Combined with third-party services and domain spoofing, attackers can hijack threads, impersonate victims, and manipulate vendor communications, all without network-level interception.  https://www.proofpoint.com/us/blog/threat-insight... read more.

  • April 24, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In The Lord of the Rings, the One Ring is small, unassuming, and even useful—at first. It grants power and convenience, but every additional moment it’s worn increases risk, influence, and loss of control. The danger isn’t obvious until it’s too late. Browser and email client extensions often play the same role in enterprise environments. They look harmless, promise productivity, and... read more.

  • April 21, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In The Matrix Reloaded (2003), the Merovingian controls access to critical pathways inside the Matrix. He doesn’t stop everyone—he decides who and what is allowed to pass. Information still flows, but only through channels he permits. That selective control is what gives him power. CIS Safeguard 9.3 is built on the same principle. Network-based URL filtering isn’t about blocking the intern... read more.

  • April 14, 2026

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/6 How Microsoft 365 Copilot Customers Should Think About Agent Control (Rubrik) Building your agent control framework around Copilot now means you're prepared when the rest of the agent ecosystem arrives. Rubrik Agent Cloud's vendor-neutral architecture ensures that the policies, monitoring, and recovery capabilities you build today extend seamlessly to every agent platform you adopt tomorrow. https://www.rubrik.com/blog/company/26/4/how-microsoft-365-copilot-customers-should-think-about-agent-c... read more.

  • April 10, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In CSI: Crime Scene Investigation (2000–2015), the most important moments don’t happen when evidence is collected—they happen when investigators review it, correlate it, and challenge assumptions. Bags of evidence sitting on a shelf solve nothing. The case only breaks when someone sits down, replays the data, and asks, “What does this actually tell us?” That is the core idea be... read more.

  • April 07, 2026

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/30 Temporal hunting: Time as a threat hunting surface (Cribl) By embedding threat intelligence at the pipeline level and carrying it through federated searches, organizations gain a hunting workflow that thinks in time, not silos. Every pivot to hot alerts, warm logs, or long-term archives is accelerated and informed. https://cribl.io/blog/temporal-hunting-time-as-a-threat-hunting-surface/ Citrix + Amazon WorkSpaces Core: A Flexible Path to Cloud VDI Historically, Azure was effectively the onl... read more.

  • April 03, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In Blade Runner 2049 (2017), the central mystery hinges on memory. What was recorded, what was preserved, and what was lost determines who can understand the truth and who remains in the dark. The film makes a simple but powerful point: without reliable memory, reconstruction becomes speculation. CIS Safeguard 8.10 is built on that same idea. If audit logs are not retained long enough, incidents can’t... read more.

  • March 31, 2026