Articles by 'Steve Gold'

Blog Author - Steve Gold

Steve Gold is the Cybersecurity Practice Director at Gotham Technology Group (Gotham). He is responsible for providing the vision and thought leadership to expand Gotham’s legacy of success and build a world-class cybersecurity practice. He works closely with Gotham’s customers, industry partners, and subject matter experts to develop relevant solutions for Gotham’s clients and prospects.

Prior to joining Gotham, Steve worked with the Center for Internet Security (CIS), where he expanded the global reach, revenue, and impact of the CIS Benchmarks, CIS Controls, and CIS Hardened Images. He led the efforts to promote the CIS portfolio of low-cost and no-cost cybersecurity products and services that help private and public organizations stay secure in the connected world. He grew a team of security specialists from 12 to over 40 to assist organizations with implementing security best practices in their continual journey of cybersecurity maturity.

During his more than 20-year career, Steve led teams responsible for developing and implementing technology solutions at some of the industry’s most recognized companies such as Varonis, VMware, Dell & Wyse Technology

Steve is a frequent speaker/moderator at industry conferences and webinars, covering a wide array of information security topics. He resides and works remotely in Baltimore, MD.

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In Ridley Scott’s The Martian, astronaut Mark Watney is stranded on Mars with limited resources and a damaged habitat. His survival hinges on one critical principle: identify problems quickly and fix them immediately. Whether it’s sealing a breach in the Hab or hacking together a communication system, Watney must detect issues and remediate them immediately for his survival. This is the essence... read more.

  • January 27, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In Jurassic Park, the electric fences surrounding the dinosaur enclosures were the first line of defense. They were designed to keep threats contained and protect the outside world. But when those fences failed—due to poor maintenance and lack of monitoring—the consequences were catastrophic. This is the perfect analogy for CIS Safeguard 7.6, which emphasizes the importance of automated vulnerab... read more.

  • January 14, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In the Marvel Cinematic Universe, Tony Stark’s Iron Man suit is a technological marvel. But what truly makes it formidable isn’t just the armor, it’s the automated diagnostics and internal scans that constantly monitor for damage, threats, and system vulnerabilities. Every time Stark takes a hit, the suit runs a scan, identifies the issue, and adapts in real time. This is precisely the kin... read more.

  • January 06, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation Why Every Organization Needs an Inventory of Authentication and Authorization Systems Identity is the new perimeter. As organizations adopt cloud services, remote work, and third-party integrations, the number of systems that manage authentication and authorization has grown, often without centralized oversight. That’s where CIS Safeguard 6.6 comes in. What is CIS Safeguard 6.6? CIS Safeguard 6.6, p... read more.

  • September 30, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation Jurassic Park and the Forgotten Gatekeepers: Why You Need an Inventory of Authentication and Authorization Systems In Jurassic Park, the park’s downfall wasn’t just the dinosaurs, it was the lack of control over who had access to what. Dennis Nedry, the disgruntled systems engineer, had unchecked access to critical systems. When he disabled security to steal embryos, no one knew how to stop him... read more.

  • September 24, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation CIS Safeguard 5.6: Centralize Account Management In Thor: Ragnarok, there’s a memorable and comical scene where Thor is trying to escape Sakaar aboard a QuinJet. Thor starts the QuinJet with the panel green. QUINJET (V.O.): Voice verification required. THOR: Thor. QUINJET (V.O.): Access denied. THOR: Thor, son of Odin. QUINJET (V.O.): Access denied. THOR: God of Thunder. QUINJET (V.O.): Ac... read more.

  • August 19, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation Mission: Impossible and the Mystery of Service Accounts — Why You Need an Inventory In Mission: Impossible, Ethan Hunt and his team rely on stealth, precision, and insider knowledge to infiltrate secure systems and extract sensitive data. But imagine if the IMF (Impossible Mission Force) didn’t know who had access to what. Chaos, right? That’s exactly what happens in many organizations wh... read more.

  • August 13, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation The Last of Us” and the Last Line of Defense: Why Remote Wipe Matters in Cybersecurity In HBO’s The Last of Us, society collapses after a fungal infection turns most of humanity into mindless, infected hosts. The few survivors cling to safety behind fortified walls, constantly on guard against threats that could breach their defenses. It’s a gripping metaphor for the modern cybersecurity l... read more.

  • July 29, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In the TV series 24, Jack Bauer races against the clock to stop cyberattacks, terrorist threats, and national crises. Every second matters. A moment of inaction can lead to disaster. That same urgency applies to CIS Safeguard 4.10, which emphasizes the importance of automatically locking portable end-user devices after a short period of inactivity. Because in cybersecurity, just like in&... read more.

  • July 22, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation The Matrix and the Power of Choosing the Right Reality In the 1999 sci-fi classic The Matrix, Neo is offered a choice: take the red pill and see the truth, or take the blue pill and remain in a fabricated illusion. This iconic moment is more than just cinematic gold, it’s a perfect metaphor for CIS Safeguard 4.9, which urges organizations to configure trusted DNS servers on all enterpri... read more.

  • July 15, 2025