Blog

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In the 1993 film Jurassic Park, there’s an iconic scene where Lex Murphy stares at a 3D file system and exclaims, “It’s a Unix system! I know this!” What makes the moment memorable isn’t just the line—it’s the idea that understanding the underlying system reveals what’s really happening behind the scenes. In cybersecurity, DNS query audit logs play a very simi... read more.

  • February 24, 2026

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/16 The strategic SIEM buyer’s guide: Choosing an AI-ready platform for the agentic era (Microsoft) As organizations step into the agentic AI era, the priority shifts to establishing a security foundation that can absorb rapid change without adding operational drag. That requires an architecture built for flexibility—one that brings security data, analytics, and response capabilities together rather than scattering them across aging infrastructure. https://www.microsoft.com/en-us/secu... read more.

  • February 20, 2026

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/9 Endpoint Scarcity, Security Pressure: Why CISOs Are Reassessing the Risk at the Edge (IGEL) As storage and memory constraints intensify, organizations are being forced to reassess whether traditional endpoint operating systems and refresh cycles still make financial and operational sense. Anchoring productivity, security, and user experience to increasingly resource-intensive endpoints create growing risk, not only to budgets, but also to business continuity. https://www.igel.com/blog/when-har... read more.

  • February 13, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In The Bourne Identity, Jason Bourne is a man on the run, trying to piece together his past while evading a global intelligence network. The agencies chasing him rely heavily on surveillance, communications intercepts, and, most importantly, detailed logs of his movements, interactions, and digital footprints. Without those logs, they’d have no way to reconstruct his path or understand how he keeps sl... read more.

  • February 10, 2026

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/2 Why Citrix is the most complete EUC platform (Citrix) Enterprises need a solution that addresses today’s challenges and prepares them for tomorrow. Citrix delivers by continuously enhancing our platform with features that improve performance, security, and management. https://www.citrix.com/blogs/2026/01/26/why-citrix-is-the-most-complete-euc-platform/ Microsoft fixes Outlook bug blocking access to encrypted emails Microsoft has fixed a known issue that prevented Microsoft 365 customer... read more.

  • February 06, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In Back to the Future, time is everything. Doc Brown’s DeLorean time machine relies on precise synchronization to travel to specific moments in history. A miscalculation of even a few seconds could mean arriving in the wrong year, or worse, the wrong timeline. In cybersecurity, time synchronization isn’t about time travel, but it’s just as critical. CIS Safeguard 8.4 emphasizes the need to... read more.

  • February 04, 2026

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/26 A strong EUC and cloud strategy isn’t one-size-fits-all. It’s about identifying the solutions that make the most sense for your business. Gotham delivers tailored EUC solutions that align directly with your business objectives, driving productivity, security, and scalability. If you are a current Gotham customer contact your Gotham rep or if you are new to us please contact our Business Development Representative Sierra Birmingham for a link to the full webinar where Gotham’s... read more.

  • January 30, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In Ridley Scott’s The Martian, astronaut Mark Watney is stranded on Mars with limited resources and a damaged habitat. His survival hinges on one critical principle: identify problems quickly and fix them immediately. Whether it’s sealing a breach in the Hab or hacking together a communication system, Watney must detect issues and remediate them immediately for his survival. This is the essence... read more.

  • January 27, 2026

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/19 The Continuing Risk of Remote Code Execution (Arctic Wolf) Remote code execution gives the attacker the ability to take control over a process or device and run their own code remotely. Notable RCE attacks and how to defend against it. https://arcticwolf.com/resources/blog/the-continuing-rise-of-remote-code-execution/ Microsoft releases OOB Windows updates to fix shutdown, Cloud PC bugs Microsoft has released multiple emergency, out-of-band updates for Windows 10, Windows 11, and Windows Se... read more.

  • January 23, 2026

By Gotham, Posted in Infrastructure

Written with contributions from Brian Wagner, Practice Director - EUC and Cloud, Ryan Lee, Senior Solutions Architect, Gotham Technology Group, and Dean Cefola, Principal Technical Marketing Manager, Nerdio. Windows 365 offers a predictable, per-user monthly pricing model that simplifies cloud VDI budgeting. However, without proper oversight, costs can escalate due to over-provisioned resources and underutilized licenses. Proactive cost management is essential to maximize your return on inve... read more.

  • January 19, 2026