Articles by 'Eric Corcoran'

Blog Author - Eric Corcoran

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/1 Citrix Autoscale: Unlock better user experiences, maximize resource utilization, and achieve better cost management (Citrix) Citrix Autoscale is designed to help customers address these challenges by scaling resources based on real-time demand such as peak times, schedules, and session (single or multi-session) type in your on-premises and cloud environments. https://www.citrix.com/blogs/2024/03/29/citrix-autoscale-unlock-better-user-experiences-maximize-resource-utilization-and-achieve-better... read more.

  • April 05, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/25 Is your VPN reaching End of Maintenance? Don’t let it put you at risk (Check Point) A legacy VPN does one thing and one thing only: it connects remote workers to the company network. The problem is that most employees don’t need, and shouldn’t have, access to the entire network, just to specific applications and data within it. https://blog.checkpoint.com/security/embrace-the-future-of-remote-access-transitioning-from-legacy-vpns-to-sase/ Tuesday 3/26 Barbasol ft. Bryon Si... read more.

  • March 29, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/18 Gotham has earned a spot on the 2024 #CRNTechElite250 list, recognizing us as one of the top IT solution providers in North America. We are proud to continue to provide the best service for our customers. @thechannelco Click the link to see the full list. www.CRN.com/TechElite250 Let AI Handle the Heavy Lifting in the Modern SOC (Palo Alto Networks) AI is transforming the SOC landscape by automating mundane tasks like alert triage, allowing even smaller SOC teams to handle large workflows (n... read more.

  • March 22, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/11 Why Identity Security Is Essential to Cybersecurity Strategy (CyberArk) At the heart of cybersecurity is identity security – the principle that the right people have the right access at the right time. As we venture further into the digital world, protecting the business from modern threats is crucial, which inherently adds complexity, making smart privilege controls a must-have step toward an identity-first strategy. https://www.cyberark.com/resources/blog/why-identity-security-is-esse... read more.

  • March 15, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/4 You Don’t Have to Compromise: All-flash Storage Reduces Costs for All Workloads (Pure Storage) Organizations face the challenge of IT cost optimization: balancing burgeoning data demands with constrained budgets. Pure Storage offers an innovative, proven solution that ensures companies can meet their storage needs without compromise. https://blog.purestorage.com/perspectives/you-dont-have-to-compromise-all-flash-storage-reduces-costs-for-all-workloads/ Why EDR is Not Enough (Arctic Wolf... read more.

  • March 08, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/19 The State of Security in 2024: The Bad Guys Love AI Too (Pure Storage) AI is allowing the bad guys to scale their attack campaigns. AI is also opening the door for newbie attackers who need little knowledge of coding to launch effective campaigns. Here’s what’s happening right now in security, and why these trends will likely dominate the rest of this year. https://blog.purestorage.com/perspectives/10-security-trends-and-predictions/ The Ins and Outs of Data Privacy, Part 1: The... read more.

  • March 01, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/12 CrowdStrike Defends Against Azure Cross-Tenant Synchronization Attacks (CrowdStrike) As Microsoft Azure continues to gain market share in the cloud infrastructure space, it has garnered attention from adversaries ranging from hacktivist and eCrime threat actors to nation-state adversaries. Recent attacks on Microsoft by cloud-focused threat actors like COZY BEAR are becoming more frequent and garnering huge attention. https://www.crowdstrike.com/blog/crowdstrike-defends-against-azure-cross-te... read more.

  • February 16, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/5 ICYMI: Gotham CTO Ken Phelan and Nutanix Senior Vice President of Solution Sales Mike Phelan met to discuss the cost effectiveness of hybrid cloud solutions as cloud providers encourage users to "go native." Click the link below for the full video. https://www.youtube.com/watch?v=vL2My98ISek Tuesday 2/6 Zero Days ft. Bryon Singh, RailWorks Corporation https://www.gothamtg.com/blog/zero-days Architecture Drift: What It Is and How It Leads to Breaches (CrowdStrike) Each time a digital ecosy... read more.

  • February 09, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/29 Evergreen//One Recognized as DCIG TOP 5 Storage as-a-Service Solution (Pure Storage) The Data Center Intelligence Group (DCIG) recently recognized Evergreen//One™ from Pure Storage as a DCIG TOP 5 solution in the 2022-23 DCIG TOP 5 Enterprise Storage as a Service Solutions report. https://blog.purestorage.com/products/evergreen-one-recognized-as-dcig-top-5-storage-as-a-service-solution/ 5 Common Privilege Escalation Attack Techniques with Examples (Proofpoint) Privilege escalation is... read more.

  • February 02, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/22 Moving OneNote Notebooks Microsoft OneNote is a popular program for taking and sharing notes. One challenge with OneNote though is moving or migrating notebooks. This challenge has become amplified because Microsoft has changed the options available for moving notebooks through the various flavors and versions of OneNote over the years. There is also confusing documentation on how to move notebooks. Hopefully this blog will provide some clarity. https://www.gothamtg.com/blog/moving-onenote-no... read more.

  • January 26, 2024