Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/19 Preventing Cyber Attacks is Critical to Improve Healthcare Outcomes (Check Point) Last month, 1 out of every 44 organizations across the United States were impacted by ransomware attacks. Healthcare organizations continue to be among the top 3 most impacted industries. https://bit.ly/3Pkm4pn Six Critical Vulnerabilities Patched with Microsoft’s June Security Update (Arctic Wolf) On June 13, 2023, Microsoft published their June 2023 Security Update which included patches for six vulner... read more.

  • June 23, 2023

By Carlo Costanzo, Posted in Infrastructure

In an article posted last month, Tim Husar demonstrated how to reset an ILO password on a VMware ESXi host without any downtime. Today, I want to show you a different variation of that process, tailored for an older ILO card operating with an earlier version of ESXi. Since we are using tools that are native on the ESXi HPE custom build, depending on which version you are running, you might need to run different tools. In our case, we had an ILO 5 running on a 6.7 ESXi host. We were running through our upgr... read more.

  • June 21, 2023

By Timothy Karl, Posted in Infrastructure

Citrix continues to innovate their Citrix Cloud platform with new enhancements and capabilities. Here are some highlights of some of the recent new enhancements and capabilities that are now available to the public: Citrix Cloud Now Supports Google Cloud Identity Google Cloud Identity is now supported as an identity provider for subscribers. This provides a unified single sign-on experience to access Citrix Workspace and Google resources. Please note this only works for end-user subscribers, it does not s... read more.

  • June 21, 2023

By Steve Gold, Posted in Security

Hopefully, you get the reference above from the SNL skit. I thought about manipulating Billy Joel’s amazing song ”Say Goodbye to Hollywood” but decided to go simpler. OK, let’s get into it. In today's data-driven world, organizations collect and store vast amounts of sensitive information. However, with the growing number of cyber threats and regulatory requirements, securely disposing of data is just as crucial as protecting it. As part of an enterprise's comprehensive data managem... read more.

  • June 21, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/12 Fortinet Converges NGFW and SD-WAN to Protect Traffic Traversing the Entire Azure vWAN Environment (Fortinet) Azure vWAN is a cloud service that brings together networking, security, and routing under a single operational interface, and customers typically use it to provide connectivity between their on-premises data centers, branch offices, and Azure vWANs. https://bit.ly/3p2h1z2 Tuesday 6/13 F5 Published Cybersecurity Research: Performance and Effectiveness on ML/AI Frameworks (F5) Organ... read more.

  • June 19, 2023

By Steve Gold, Posted in Security

To Retain Or Not To Retain? That Is The question. Memorial Day has passed and summer is here. I don’t know about you but each summer I go through my closet in an attempt to de-clutter. As I stand in my closet looking at clothing that doesn’t fit anymore to donate, or ripped/stained/damaged clothing to discard, all I can think about is Data Retention. I know, right! Wouldn’t it be great if you could simply look at your data like you look at your clothing and know whether it should be kept... read more.

  • June 14, 2023

By Carlo Costanzo, Posted in Storage

If you're unfamiliar with Robware's RVTools, you're definitely missing out. This practical tool provides a clean and uncomplicated interface to view essential information about your Virtual Machines. The feature I find most valuable is the SnapShot tab. By pointing RVTools towards your VirtualCenter, you can access a concise list of all VMs with snapshots. Basic details including the date, description, and power state are also conveniently displayed. If you're working with other groups outside your own, RV... read more.

  • June 14, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/5 What Physical NICs Are Your VMs Using? https://www.gothamtg.com/blog/what-physical-nics-are-your-vms-using Non-disruptive Workload Mobility with ActiveWorkload (Pure Storage) ActiveWorkload is a powerful tool that enables you to move workloads non-disruptively between FlashArray systems. https://bit.ly/43JYtTc Extending Zero Trust OT Security to Meet Air Gap Requirements (Palo Alto Networks) These offerings were designed to help organizations stay secure while adapting to the tremendous am... read more.

  • June 09, 2023

By Steve Gold, Posted in Security

Let’s start today’s blog with a hearty pat on the back and a big ol’ KUDOS! You get it! You can’t protect what you can’t see. You don’t need to write it on the chalkboard 100 times…unless you’re a huge Bart Simpson fan, then go ahead. Of course, we’re not done with gaining visibility into your environment as you’ll see in future posts. So sorry, not sorry. Now that you have your data inventory, it’s important to know who can access your dat... read more.

  • June 06, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/22 The Evolving Landscape of Distributed Application Security: Beyond Network Firewalls (F5) With the dispersion of application services across highly distributed environments, security has become an infinitely more complex endeavor. https://bit.ly/3MNtaRB The Seven Types of Non-human Identities to Secure (CyberArk) Being aware of all the different identity types in your organization and understanding all the different security needs that must be considered are the first steps to building a co... read more.

  • June 02, 2023