Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/4 How to mitigate AI-powered social engineering attacks (Delinea) AI can convincingly simulate identities across multiple channels and formats, making AI-powered social engineering attacks more convincing and likely to fool even the savviest, most security-conscious employees. Additionally, AI can execute attacks at scale, learn from its successes, and continually become smarter and stealthier. https://delinea.com/blog/how-to-mitigate-ai-powered-social-engineering-attacks Exploiting Direct Send... read more.

  • August 08, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/28 Redefining DNS Protection (Palo Alto Networks) Advanced DNS Resolver (ADNSR) is purpose-built for this modern reality, delivering intelligent threat prevention with effortless deployment. As a cloud-delivered DNS resolution service, complete with 99.999% availability, ADNSR makes it easy to protect your entire organization, regardless of where your users or infrastructure reside. https://www.paloaltonetworks.com/blog/2025/07/redefining-dns-protection/ How the Enterprise Browser Neutralizes t... read more.

  • August 01, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation The Last of Us” and the Last Line of Defense: Why Remote Wipe Matters in Cybersecurity In HBO’s The Last of Us, society collapses after a fungal infection turns most of humanity into mindless, infected hosts. The few survivors cling to safety behind fortified walls, constantly on guard against threats that could breach their defenses. It’s a gripping metaphor for the modern cybersecurity l... read more.

  • July 29, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/14 XenServer: Powering your present, readying your future, and now available for all workloads (Citrix) XenServer is widening its support statement to embrace all types of workloads. This isn’t just a minor update; it’s a strategic move to address the very real challenges facing our customers today, offering a powerful, cost-effective, and versatile hypervisor for your entire virtualized infrastructure. https://www.citrix.com/blogs/2025/07/09/xenserver-now-available-for-all-workloads... read more.

  • July 25, 2025

By Timothy Karl, Posted in Infrastructure

Microsoft has officially set the end-of-life date for both Exchange Server 2016 and Exchange Server 2019: October 14, 2025. That might sound like a long way off, but in IT terms, it’s right around the corner, especially if your organization still relies on Exchange for SMTP relay, hybrid identity, or legacy app integration. Here’s what’s changing and how to prepare. What’s Replacing Exchange 2016 and 2019? Instead of releasing a new standalone version of Exchange, Microsoft is mov... read more.

  • July 22, 2025

By Ed Bratter, Posted in Infrastructure

Security of an Active Directory (AD) infrastructure can be significantly increased by deploying Active Directory Certificate Services (AD CS) and installing certificates on domain controllers (DC). AD CS plays a foundational role for enabling certificate-based security across a range of services in AD. Some notable security enhancements are as follows:  Securing AD communication between domain joined machines. Allow for securing LDAP traffic, which by default is not encrypted. This means that cre... read more.

  • July 22, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In the TV series 24, Jack Bauer races against the clock to stop cyberattacks, terrorist threats, and national crises. Every second matters. A moment of inaction can lead to disaster. That same urgency applies to CIS Safeguard 4.10, which emphasizes the importance of automatically locking portable end-user devices after a short period of inactivity. Because in cybersecurity, just like in&... read more.

  • July 22, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation The Matrix and the Power of Choosing the Right Reality In the 1999 sci-fi classic The Matrix, Neo is offered a choice: take the red pill and see the truth, or take the blue pill and remain in a fabricated illusion. This iconic moment is more than just cinematic gold, it’s a perfect metaphor for CIS Safeguard 4.9, which urges organizations to configure trusted DNS servers on all enterpri... read more.

  • July 15, 2025

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 7/1 10 Questions to Evaluate Cloud Email Security Solutions (Abnormal AI) Today’s threats to cloud email use AI to impersonate trusted contacts, mimic real workflows, and blend seamlessly into day-to-day communication. To stop these attacks, security teams require solutions that use AI the way attackers do—strategically, contextually, and at scale. https://abnormal.ai/blog/10-questions-to-evaluate-cloud-email-security The Enterprise’s New Cloud: Where Data Went Wrong and How St... read more.

  • July 11, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation Do more with less. That’s the core idea behind CIS Safeguard 4.8, which advises organizations to uninstall or disable unnecessary services on enterprise assets and software. Why? Because every extra service is a potential doorway for attackers. To illustrate this, let’s look at a survival lesson from The Walking Dead. The Walking Dead and the Dangers of Unsecured Doors In The Walking Dead, sur... read more.

  • July 08, 2025