Articles by 'Steve Gold'

Blog Author - Steve Gold

Steve Gold is the Cybersecurity Practice Director at Gotham Technology Group (Gotham). He is responsible for providing the vision and thought leadership to expand Gotham’s legacy of success and build a world-class cybersecurity practice. He works closely with Gotham’s customers, industry partners, and subject matter experts to develop relevant solutions for Gotham’s clients and prospects.

Prior to joining Gotham, Steve worked with the Center for Internet Security (CIS), where he expanded the global reach, revenue, and impact of the CIS Benchmarks, CIS Controls, and CIS Hardened Images. He led the efforts to promote the CIS portfolio of low-cost and no-cost cybersecurity products and services that help private and public organizations stay secure in the connected world. He grew a team of security specialists from 12 to over 40 to assist organizations with implementing security best practices in their continual journey of cybersecurity maturity.

During his more than 20-year career, Steve led teams responsible for developing and implementing technology solutions at some of the industry’s most recognized companies such as Varonis, VMware, Dell & Wyse Technology

Steve is a frequent speaker/moderator at industry conferences and webinars, covering a wide array of information security topics. He resides and works remotely in Baltimore, MD.

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In The Bourne Identity, Jason Bourne is a man on the run, trying to piece together his past while evading a global intelligence network. The agencies chasing him rely heavily on surveillance, communications intercepts, and, most importantly, detailed logs of his movements, interactions, and digital footprints. Without those logs, they’d have no way to reconstruct his path or understand how he keeps sl... read more.

  • February 10, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In Back to the Future, time is everything. Doc Brown’s DeLorean time machine relies on precise synchronization to travel to specific moments in history. A miscalculation of even a few seconds could mean arriving in the wrong year, or worse, the wrong timeline. In cybersecurity, time synchronization isn’t about time travel, but it’s just as critical. CIS Safeguard 8.4 emphasizes the need to... read more.

  • February 04, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In Ridley Scott’s The Martian, astronaut Mark Watney is stranded on Mars with limited resources and a damaged habitat. His survival hinges on one critical principle: identify problems quickly and fix them immediately. Whether it’s sealing a breach in the Hab or hacking together a communication system, Watney must detect issues and remediate them immediately for his survival. This is the essence... read more.

  • January 27, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In Jurassic Park, the electric fences surrounding the dinosaur enclosures were the first line of defense. They were designed to keep threats contained and protect the outside world. But when those fences failed—due to poor maintenance and lack of monitoring—the consequences were catastrophic. This is the perfect analogy for CIS Safeguard 7.6, which emphasizes the importance of automated vulnerab... read more.

  • January 14, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In the Marvel Cinematic Universe, Tony Stark’s Iron Man suit is a technological marvel. But what truly makes it formidable isn’t just the armor, it’s the automated diagnostics and internal scans that constantly monitor for damage, threats, and system vulnerabilities. Every time Stark takes a hit, the suit runs a scan, identifies the issue, and adapts in real time. This is precisely the kin... read more.

  • January 06, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation Why Every Organization Needs an Inventory of Authentication and Authorization Systems Identity is the new perimeter. As organizations adopt cloud services, remote work, and third-party integrations, the number of systems that manage authentication and authorization has grown, often without centralized oversight. That’s where CIS Safeguard 6.6 comes in. What is CIS Safeguard 6.6? CIS Safeguard 6.6, p... read more.

  • September 30, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation Jurassic Park and the Forgotten Gatekeepers: Why You Need an Inventory of Authentication and Authorization Systems In Jurassic Park, the park’s downfall wasn’t just the dinosaurs, it was the lack of control over who had access to what. Dennis Nedry, the disgruntled systems engineer, had unchecked access to critical systems. When he disabled security to steal embryos, no one knew how to stop him... read more.

  • September 24, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation CIS Safeguard 5.6: Centralize Account Management In Thor: Ragnarok, there’s a memorable and comical scene where Thor is trying to escape Sakaar aboard a QuinJet. Thor starts the QuinJet with the panel green. QUINJET (V.O.): Voice verification required. THOR: Thor. QUINJET (V.O.): Access denied. THOR: Thor, son of Odin. QUINJET (V.O.): Access denied. THOR: God of Thunder. QUINJET (V.O.): Ac... read more.

  • August 19, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation Mission: Impossible and the Mystery of Service Accounts — Why You Need an Inventory In Mission: Impossible, Ethan Hunt and his team rely on stealth, precision, and insider knowledge to infiltrate secure systems and extract sensitive data. But imagine if the IMF (Impossible Mission Force) didn’t know who had access to what. Chaos, right? That’s exactly what happens in many organizations wh... read more.

  • August 13, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation The Last of Us” and the Last Line of Defense: Why Remote Wipe Matters in Cybersecurity In HBO’s The Last of Us, society collapses after a fungal infection turns most of humanity into mindless, infected hosts. The few survivors cling to safety behind fortified walls, constantly on guard against threats that could breach their defenses. It’s a gripping metaphor for the modern cybersecurity l... read more.

  • July 29, 2025