Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/23 Are You Using Everything in Your Citrix Cloud Subscription? Features like Citrix Enterprise Browser, Remote Browser Isolation (RBI), and Secure Private Access (SPA) are included in many Advanced Plus and Premium subscriptions, but often go unused. https://www.gothamtg.com/blog/are-you-using-everything-in-your-citrix-cloud-subscription Cloud Attacks Retrospective: Evolving Tactics, Familiar Entry Points (Wiz) Cloud environments are growing more complex—but attackers aren’t necess... read more.

  • June 27, 2025

By Timothy Karl, Posted in Infrastructure, Virtualization

If you're using Citrix Cloud DaaS, you may already have access to powerful tools beyond Virtual Apps and Desktops. Features like Citrix Enterprise Browser, Remote Browser Isolation (RBI), and Secure Private Access (SPA) are included in many Advanced Plus and Premium subscriptions, but often go unused. These built-in tools can help improve security, support BYOD, and reduce reliance on third-party solutions without extra cost. What’s Included? Enterprise Browser A secure, policy-controlled browser... read more.

  • June 23, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/16 AI Is Everywhere—But Security Teams Are Still Catching Up (Wiz) AI is no longer experimental—it’s embedded. According to a recent survey of 96 organizations conducted by Wiz and Gatepoint Research, 87% of respondents’ teams are already using AI services, often through platforms like OpenAI or Amazon Bedrock. But as AI adoption surges, security isn’t keeping pace. https://www.wiz.io/blog/ai-security-readiness-report Optimizing Workloads in a Multicloud World (Nut... read more.

  • June 20, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation CIS Safeguard 3.12 mandates the segmentation of sensitive data while it is stored. This strategy involves categorizing and handling data according to its sensitivity, thus ensuring that the most critical information receives the highest level of protection. Data segmentation involves dividing data into distinct categories based on its sensitivity. Sensitive information, such as financial records, personal d... read more.

  • June 17, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/9 No Excuses: Why Multi-Factor Authentication is Non-Negotiable (Check Point ) If you think your users’ passwords are secret, think again. Credential dumps from breached companies are traded daily on the dark web. Password reuse is rampant. Phishing attacks are more sophisticated than ever, and employees are fallible — always have been, always will be. https://blog.checkpoint.com/harmony-sase/no-excuses-why-multi-factor-authentication-is-non-negotiable/ Rethinking File Storage: Pure... read more.

  • June 13, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/19 Phishing Campaign Mimics Email Quarantine Notifications: 32,000 Emails Target 6,358 Customers (Check Point) Check Point researchers have identified a large-scale phishing campaign that exploits the guise of email quarantine notifications. This campaign, consisting of 32,000 emails, has targeted 6,358 customers across various regions. The primary objective of the attackers is to deceive recipients into providing their login credentials through a fake login page. https://blog.checkpoint.com/sec... read more.

  • June 06, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation CIS Safeguard 3.11 mandates the encryption of sensitive data while it is stored, also known as "data at rest." This includes data stored on various mediums, such as hard drives, databases, and cloud storage. Encrypting data at rest ensures that even if unauthorized individuals gain access to the storage media, they cannot easily read or use the data without the corresponding encryption keys. The Importance... read more.

  • May 20, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/12 6 Customer-proven Best Practices for Cyber-resilient Backup and Recovery (Pure Storage) From the 3-2-1-1-0 framework to indelible data to faster threat detection, cyber resilience best practices can help organizations safeguard their operations and recover quickly and confidently when the worst happens. https://blog.purestorage.com/perspectives/6-customer-proven-best-practices-for-cyber-resilient-backup-and-recovery/ April 2025 Malware Spotlight: FakeUpdates Dominates as Multi-Stage Campaign... read more.

  • May 16, 2025

By Ken Phelan, Posted in Security

Fort Pulaski was completed in 1847. Built as a response to the War of 1812, it was a state-of-the-art fort built to protect the port of Savannah. Its walls were 11 feet thick and the moat was eight feet wide. But the real genius lay in its location. On an island in the middle of the Savannah River, it was a full mile from the nearest land on Tybee Island. It could not be approached by land. The smoothbore cannons of the time had a range of about half a mile, therefore land-based cannons could not be brought... read more.

  • May 15, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation CIS Safeguard 3.10 mandates the encryption of sensitive data while it is being transmitted over networks. This includes data shared between internal systems or data exchanged with external parties. The goal is to protect the data from eavesdropping, tampering, and unauthorized access during its journey from one point to another. By encrypting sensitive data in transit, organizations can significantly reduce... read more.

  • May 13, 2025