Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/19 Phishing Campaign Mimics Email Quarantine Notifications: 32,000 Emails Target 6,358 Customers (Check Point) Check Point researchers have identified a large-scale phishing campaign that exploits the guise of email quarantine notifications. This campaign, consisting of 32,000 emails, has targeted 6,358 customers across various regions. The primary objective of the attackers is to deceive recipients into providing their login credentials through a fake login page. https://blog.checkpoint.com/sec... read more.

  • June 06, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation CIS Safeguard 3.11 mandates the encryption of sensitive data while it is stored, also known as "data at rest." This includes data stored on various mediums, such as hard drives, databases, and cloud storage. Encrypting data at rest ensures that even if unauthorized individuals gain access to the storage media, they cannot easily read or use the data without the corresponding encryption keys. The Importance... read more.

  • May 20, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/12 6 Customer-proven Best Practices for Cyber-resilient Backup and Recovery (Pure Storage) From the 3-2-1-1-0 framework to indelible data to faster threat detection, cyber resilience best practices can help organizations safeguard their operations and recover quickly and confidently when the worst happens. https://blog.purestorage.com/perspectives/6-customer-proven-best-practices-for-cyber-resilient-backup-and-recovery/ April 2025 Malware Spotlight: FakeUpdates Dominates as Multi-Stage Campaign... read more.

  • May 16, 2025

By Ken Phelan, Posted in Security

Fort Pulaski was completed in 1847. Built as a response to the War of 1812, it was a state-of-the-art fort built to protect the port of Savannah. Its walls were 11 feet thick and the moat was eight feet wide. But the real genius lay in its location. On an island in the middle of the Savannah River, it was a full mile from the nearest land on Tybee Island. It could not be approached by land. The smoothbore cannons of the time had a range of about half a mile, therefore land-based cannons could not be brought... read more.

  • May 15, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation CIS Safeguard 3.10 mandates the encryption of sensitive data while it is being transmitted over networks. This includes data shared between internal systems or data exchanged with external parties. The goal is to protect the data from eavesdropping, tampering, and unauthorized access during its journey from one point to another. By encrypting sensitive data in transit, organizations can significantly reduce... read more.

  • May 13, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/5 ICYMI: On April 22, 2025, Gotham's CTO, Ken Phelan, was joined by Check Point Software's Head of U.S. East Sales, Mark Ostrowski, to discuss Check Point's latest Threat Report, their cybersecurity innovations involving artificial intelligence, and more. Click the link below for the full video. https://www.youtube.com/watch?v=WwTolJAStz4&t The Expanding Attack Surface: Stopping Account Takeovers at Your Front Door Is Critical (Proofpoint) Organizations must understand that there are count... read more.

  • May 09, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation Encrypting Data on Removable Media: The "Q" of Cybersecurity In the thrilling world of James Bond, "Q" is the gadget master, equipping 007 with state-of-the-art technology to keep his missions secure. From encrypted briefcases to self-destructing drives, Q ensures that Bond's classified information remains out of enemy hands. In the realm of cybersecurity, encrypting data on removable media plays a similarl... read more.

  • May 06, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/28 Windows 10 Enterprise End of Life: What you need to know & next steps (Nerdio) As support ends, the risks stack up quickly. Without regular updates, virtual desktops running Windows 10 will become targets for cyberattacks, particularly in environments where endpoints are exposed to external traffic or house confidential information. https://getnerdio.com/resources/windows-10-enterprise-end-of-life-what-you-need-to-know-next-steps/ Proofpoint Innovations That Simplify Your Operations (Pro... read more.

  • May 02, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation Documenting Data Flows: Navigating the Maze of Cybersecurity with Pac-Man In the world of cybersecurity, documenting data flows is as essential as navigating through a complex maze. Much like Pac-Man, the beloved arcade game character who zips around collecting dots and avoiding ghosts, organizations must meticulously track and understand the pathways that their data takes. This process is encapsulated in C... read more.

  • April 29, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/21 Modern Cybersecurity Strategies for Linux Servers (CyberArk) Organizations can effectively bridge the gap between traditional and modern infrastructures by adopting enhanced flexibility, strong authentication support and the ability to integrate with existing security tools. This holistic approach can strengthen security and support the continuous evolution of cybersecurity practices. https://www.cyberark.com/resources/blog/modern-cybersecurity-strategies-for-linux-servers What Is Data Gover... read more.

  • April 25, 2025