Blog

By Steve Gold, Posted in Security

Ok, so that’s not exactly what the sign typically says but you should have your own sign that says “No Approval. No Authorization. No Access!” No one wants uninvited guests in their home/party just like no wants unauthorized, unapproved assets on their network. You need the visibility to know who/what is on your network and the ability to remove them if they’re not authorized. Those unauthorized assets can unknowingly expand your blast radius and increase your attack surface. Wheth... read more.

  • April 25, 2023

By Brian Wagner, Posted in Infrastructure, Virtualization

Gotham has been delivering secure applications to client machines for over 20 years. In the past, this was done primarily through local installs, published applications, and virtual desktops. However, the application landscape is changing, and applications are now being delivered from more sources to more destinations. This includes SaaS applications, applications delivered from multiple brokers, multiple operating systems, and policy-based variations of the above scenarios. One example of this change is t... read more.

  • April 24, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/17 General Availability of Check Point CloudGuard Network Security with Azure Gateway Load Balancer (Check Point) With CloudGuard, customers can now protect their data, applications and services from potential threats in the cloud with greater security efficacy, and the integration simplifies and improves the design of secure Azure deployments. https://bit.ly/41c0LJV Enable seamless agent upgrades with Citrix WEM (Citrix) Citrix Workspace Environment Management (WEM) agent upgrades are importa... read more.

  • April 21, 2023

By Steve Gold, Posted in Security

Don’t know what a blast radius is, well let’s turn to our friend Wikipedia: “The distance from the source that will be affected when an explosion occurs. A blast radius is often associated with bombs, mines, explosive projectiles (propelled grenades), and other weapons with an explosive charge.” From a security perspective, blast radius is used “to designate the impact that a security breach of one single component has on the overall environment. Reducing the blast radius of a... read more.

  • April 18, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/10 Diving deep into Citrix zero trust architecture (Citrix) As enterprises migrate toward a mature zero trust architecture, it is important to understand the core concepts of how to design the architecture and how to configure the environment to satisfy the tenets of a zero trust architecture. https://bit.ly/3mj2LAE AI, ChatGPT and Identity Security’s Critical Human Element (CyberArk) As public debate and regulatory scrutiny around artificial intelligence (AI) and machine learning (ML) i... read more.

  • April 14, 2023

By Steve Gold, Posted in Security

“There can be only one” If you’re a fan of the movie Highlander like I am, you remember that line. Now, we’re not talking about immortals killing each other until only one remains. We’re talking about security and how to get started. Although, if you post comments on that, perhaps I can start another blog, but I digress. CIS agreed with Connor MacLeod of the Clan MacLeod and felt that there can (should) be only one task for people to start their cybersecurity journey and crea... read more.

  • April 11, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/3 Last week, six people in Nashville lost their lives senselessly. Too often, we hear devastating news like this, and then move on, in the hope it never happens to us, or to our families, friends, or colleagues.   Today, Gotham will take six minutes from our days to remember those lost in last week’s tragedy. We ask you do the same, to keep these and all the other victims in your hearts, and to push for change. What’s new with Citrix — March 2023 (Citrix) This year h... read more.

  • April 07, 2023

By Steve Gold, Posted in Security

Security: the final frontier. These are the safeguards of the CIS Critical Security Controls. It’s ongoing mission: To protect organizations, To seek out security gaps and misconfigured systems, To boldly go where few security professionals have gone before. Hi, I’m Steve Gold. Cybersecurity Practice Director for Gotham Technology Group and a little bit of a closet Trekkie. I’ve spent my career working for organizations that truly help people. From Wyse Technology, which minimize... read more.

  • April 04, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/27 Protect Passwords, Don’t Just Manage Them: A Game Plan for CIOs and CISOs (CyberArk) Today’s attackers assign a level of value to employees’ passwords they once reserved for privileged users’ credentials. Why? Workers now have a shocking amount of access to sensitive resources. http://bit.ly/3JQqeB5 Simplify Array Monitoring with New App for Splunk (Pure Storage) The new unified app and technical add-on for Splunk simplify monitoring by providing performance metrics... read more.

  • March 31, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/20 What Is Zero Trust and Why Is it So Important? (CyberArk) In today’s world, the rapid pace of digital transformation, increased use of cloud services and adoption of hybrid work has created a continually shifting enterprise environment that’s chaotic and difficult to secure. http://bit.ly/401mcg4 CrowdStrike Extends Identity Security Innovations to Protect Customers and Stop Breaches (CrowdStrike) The only effective way to protect against modern attacks is an adversary-focused s... read more.

  • March 24, 2023