Gotham has earned a spot on CRN’s 2021 Tech Elite 250 list, recognizing us as one of the top IT solution providers in North America. We are proud to continue to provide the best service for our customers.
Attacker Economics and the Lure of Credential Stuffing (F5)
F5 Labs and Shape Security research recently reported that credential spill incidents nearly doubled from 2016 to 2020.
Okta and Proofpoint: Uniting People-centric Security and Identity to Protect Users Against Phishing
Strong email security and identity-centric remediation tools can help enterprises confidently automate incident response to reduce response time and help turn the tide against credential phishing attacks.
What’s new with Citrix Virtual Apps and Desktops – March 2021
We’re rolling into the new year right where we left off, continuing to release new features that help our customers adapt to business challenges and securely deploy a digital workspace with confidence, regardless of where they are on their cloud journey.
How To Avoid the Costly Risks of Cloud Misconfigurations (FireEye)
Federal agencies require continuous visibility across their cloud services, and a way to automatically notify teams when a misconfiguration is identified. Doing so not only improves cloud security, it also enhances collaboration and governance.
Join us, Citrix, and IGEL on Thursday, April 8, at 11:00 AM for our “Work from Anywhere” experience. Citrix and IGEL can help organizations of any size to better connect your people to their desired apps, desktops, and cloud workspaces – from anywhere. See the link below for more details:
Different IoT Breach, Same (In)Security Story, Broader Consequences (CyberArk)
The good news is consensus is growing that IoT devices – especially those used by enterprises and government agencies – must be treated with the same attention and gravity as traditional IT systems.
FBI: Phishing emails are spreading this sophisticated malware
A new spear-phishing campaign is attempting to infect PCs with Trickbot, one of the most prevalent and potent forms of malware around today, a joint advisory from the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) has warned.
Danielle Maurici-Arnone – RB (Toggle Magazine)
Danielle Maurici-Arnone is well aware of the burgeoning online market, and as CIO for RB’s North American Health and Nutrition division, she says the company needs diverse channels and looks to develop personal relationships to enable sustained growth.
One Size Does Not Fit All: Flexible Response Capabilities Matter (CrowdStrike)
Organizations big and small need a range of response capabilities. CrowdStrike believes that a combination of automation and analyst-driven intervention provides the flexibility organizations need for effective and efficient incident response workflows.
Overcoming Multi-cloud Security Challenges with Secure SD-WAN (Fortinet)
Despite its many benefits, multi-cloud adoption adds extra layers of management complexity, especially when cloud services are added in an ad hoc manner rather than being planned. This complexity creates management and operational challenges and increases operational costs.
How to Use Azure Private Endpoints to Restrict Public Access to WebApps (Varonis)
Azure Private Endpoint is a read-only network interface service associated with the Azure PAAS Services. It allows you to bring deployed sites into your virtual network, limiting access to them at the network level.
Report Finds Surge in Malware Aimed at MacOS
A steady increase in Mac sales makes developing malware for macOS more lucrative for hackers, while the establishment of malware-as-a-service has made creating malicious code easier than ever before.