Articles by 'Steve Gold'

Blog Author - Steve Gold

Steve Gold is the Cybersecurity Practice Director at Gotham Technology Group (Gotham). He is responsible for providing the vision and thought leadership to expand Gotham’s legacy of success and build a world-class cybersecurity practice. He works closely with Gotham’s customers, industry partners, and subject matter experts to develop relevant solutions for Gotham’s clients and prospects.

Prior to joining Gotham, Steve worked with the Center for Internet Security (CIS), where he expanded the global reach, revenue, and impact of the CIS Benchmarks, CIS Controls, and CIS Hardened Images. He led the efforts to promote the CIS portfolio of low-cost and no-cost cybersecurity products and services that help private and public organizations stay secure in the connected world. He grew a team of security specialists from 12 to over 40 to assist organizations with implementing security best practices in their continual journey of cybersecurity maturity.

During his more than 20-year career, Steve led teams responsible for developing and implementing technology solutions at some of the industry’s most recognized companies such as Varonis, VMware, Dell & Wyse Technology

Steve is a frequent speaker/moderator at industry conferences and webinars, covering a wide array of information security topics. He resides and works remotely in Baltimore, MD.

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In The Matrix Reloaded (2003), the Merovingian controls access to critical pathways inside the Matrix. He doesn’t stop everyone—he decides who and what is allowed to pass. Information still flows, but only through channels he permits. That selective control is what gives him power. CIS Safeguard 9.3 is built on the same principle. Network-based URL filtering isn’t about blocking the intern... read more.

  • April 14, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In CSI: Crime Scene Investigation (2000–2015), the most important moments don’t happen when evidence is collected—they happen when investigators review it, correlate it, and challenge assumptions. Bags of evidence sitting on a shelf solve nothing. The case only breaks when someone sits down, replays the data, and asks, “What does this actually tell us?” That is the core idea be... read more.

  • April 07, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In Blade Runner 2049 (2017), the central mystery hinges on memory. What was recorded, what was preserved, and what was lost determines who can understand the truth and who remains in the dark. The film makes a simple but powerful point: without reliable memory, reconstruction becomes speculation. CIS Safeguard 8.10 is built on that same idea. If audit logs are not retained long enough, incidents can’t... read more.

  • March 31, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In Apollo 11 (1969), hundreds of engineers didn’t sit scattered across the country making independent decisions. Instead, Mission Control in Houston became the single place where telemetry, voice communications, and system status converged. When something changed on the spacecraft, everyone who needed to know saw the same data, at the same time, and acted from a shared understanding. That is precisely... read more.

  • March 25, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In Star Wars: A New Hope (1977), when Han Solo is asked how he’ll evade Imperial forces, he doesn’t talk about grand strategy—he talks about what he’ll do at the controls of the Millennium Falcon. The outcome of the chase depends not on intent, but on the specific actions taken in the cockpit. In cybersecurity, command-line activity is that cockpit. CIS Safeguard 8.8 recognizes that... read more.

  • March 18, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In The Truman Show (1998), Truman Burbank slowly realizes that his world isn’t random. Every street he walks down, every destination he tries to reach, is subtly redirected or observed. What finally tips him off isn’t a single event, it’s the pattern of where he’s allowed to go and where he isn’t. That idea maps well to CIS Safeguard 8.7: Collect URL Request Audit Logs. In mode... read more.

  • March 04, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In the 1993 film Jurassic Park, there’s an iconic scene where Lex Murphy stares at a 3D file system and exclaims, “It’s a Unix system! I know this!” What makes the moment memorable isn’t just the line—it’s the idea that understanding the underlying system reveals what’s really happening behind the scenes. In cybersecurity, DNS query audit logs play a very simi... read more.

  • February 24, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In The Bourne Identity, Jason Bourne is a man on the run, trying to piece together his past while evading a global intelligence network. The agencies chasing him rely heavily on surveillance, communications intercepts, and, most importantly, detailed logs of his movements, interactions, and digital footprints. Without those logs, they’d have no way to reconstruct his path or understand how he keeps sl... read more.

  • February 10, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In Back to the Future, time is everything. Doc Brown’s DeLorean time machine relies on precise synchronization to travel to specific moments in history. A miscalculation of even a few seconds could mean arriving in the wrong year, or worse, the wrong timeline. In cybersecurity, time synchronization isn’t about time travel, but it’s just as critical. CIS Safeguard 8.4 emphasizes the need to... read more.

  • February 04, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In Ridley Scott’s The Martian, astronaut Mark Watney is stranded on Mars with limited resources and a damaged habitat. His survival hinges on one critical principle: identify problems quickly and fix them immediately. Whether it’s sealing a breach in the Hab or hacking together a communication system, Watney must detect issues and remediate them immediately for his survival. This is the essence... read more.

  • January 27, 2026