ICYMI: Gotham CTO Ken Phelan and Nutanix Senior Vice President of Solution Sales Mike Phelan met to discuss the cost effectiveness of hybrid cloud solutions as cloud providers encourage users to "go native."
Click the link below for the full video.
Zero Days ft. Bryon Singh, RailWorks Corporation
Architecture Drift: What It Is and How It Leads to Breaches (CrowdStrike)
Each time a digital ecosystem changes, it can introduce a weakness for a threat actor to quickly discover and exploit. As technological innovation progresses rapidly, and organizations expand their infrastructure, this weakness may take shape in the form of architecture drift.
Citrix LTSR: Plan, Upgrade, Succeed! – Part 1 (Citrix)
Our last Long Term Service Release (LTSR) was released in 2022, and since then we’ve introduced many new features via our Current Releases (CR). That means 2 years of new features are coming to our newest LTSR.
Python Info-stealer Distributed by Malicious Excel Document (Fortinet)
The attack stages before the info-stealer are simple downloaders that increase the difficulty of detection. This article introduces each stage in this attack and provides a glimpse into the world behind the malware campaign.
Generative AI is the Pride of Cybercrime Services (Check Point)
While many industries continue to explore the promise of AI to augment their capabilities, cybercriminals have also seen the powerful potential of AI in exploiting vulnerabilities and creating new attack vectors.
Harnessing the Power of AI in Cybersecurity — Predictions and Solutions (Palo Alto Networks)
In the ever-evolving landscape of cybersecurity, organizations are searching for innovative solutions to combat increasingly sophisticated cyberthreats. The integration of artificial intelligence (AI) has emerged as a game-changer in the field, a powerful tool to safeguard data and organizations.
How to Better Implement a Zero Trust Strategy (Arctic Wolf)
As organizations race to adopt the cloud, relax rules around permitting workers to use their own devices, and continue to embrace hybrid work models, employees gain unprecedented access to data, allowing them to work from anywhere at any time. But this also creates a vast attack surface that hackers are all too willing to exploit.
Cloud Migration Best Practices: 5 Keys To Success (Nerdio)
As workplace technology and tools continue to evolve, customers’ desire to take advantage of the agility, scalability, and accessibility of the cloud is growing at unprecedented rates. Many are realizing that on-prem environments just aren’t cutting it anymore, especially for organizations that operate with hybrid or remote employees.