Blog

By Steve Gold, Posted in Security

Hopefully by now you’re seeing a trend. You need full visibility into your environment and you also need both the visibility and capability to remove any unauthorized assets or software. I know this may seem kind of basic, but remember, we are only at Control 2. Wait till we get to Control 17 and start discussing Incident Response. But let’s not get ahead of ourselves just yet. After all, we are working with a prescriptive, prioritized, and simplified set of best practices. In the previous blog... read more.

  • May 09, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/1 Why Ransomware and Business Email Compromise Remain Top Attack Types (Arctic Wolf) The continued increase in cybercrime and breach attempts is not a new trend. For years now, the percentages have ticked upwards, and though cybersecurity has evolved, so have hackers seeking data, money, or infamy. https://bit.ly/3VjwGpm AI Powers the Branch of the Future, Today (Palo Alto Networks) With the establishment of hybrid work as a long-term trend and the exponential increase in cloud usage, organiza... read more.

  • May 05, 2023

By Tim Husar, Posted in Infrastructure, Support

Recently, a client became locked out of the HPE ILO Administrative account on six VMware ESXi hosts. The direct route to fixing this involves downtime, and solutions that could be done while the hosts were online couldn’t be found. We were able to review the HPE REST API documentation and resolve the issue by following the steps below. The HPE ESXi must have been installed or updated with the VMware Custom HPE Software. Enable SSH on the target HPE host. Log into the host with the root account or... read more.

  • May 04, 2023

By Steve Gold, Posted in Security

Okay, so it’s not Christmas time but my hair is getting grayer (whiter) and I’m feeling quite jolly talking about security. And because you’ve been so good reading this blog, you deserve a gift. The gift of reusability. Now, I’m not talking about that button down shirt you wore yesterday on your video calls hanging over your chair. I’m talking about using the same tool you use to inventory your assets to inventory your software. Most commercial tools that do one will also do t... read more.

  • May 02, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/24 Break the Attack Chain—Protect People, Defend Data (Proofpoint) Recently, we’ve seen a rise in cyber criminals “triple dipping” from data exfiltration. They’re getting paid to return stolen data, destroy that stolen data and reveal what modifications were made to the returned data. https://bit.ly/3n0fXuE Global Threat Trends and the Future of Incident Response (Varonis) As organizations have gotten better at recovering from ransomware attacks, threat actors mov... read more.

  • April 28, 2023

By Steve Gold, Posted in Security

Ok, so that’s not exactly what the sign typically says but you should have your own sign that says “No Approval. No Authorization. No Access!” No one wants uninvited guests in their home/party just like no wants unauthorized, unapproved assets on their network. You need the visibility to know who/what is on your network and the ability to remove them if they’re not authorized. Those unauthorized assets can unknowingly expand your blast radius and increase your attack surface. Wheth... read more.

  • April 25, 2023

By Brian Wagner, Posted in Infrastructure, Virtualization

Gotham has been delivering secure applications to client machines for over 20 years. In the past, this was done primarily through local installs, published applications, and virtual desktops. However, the application landscape is changing, and applications are now being delivered from more sources to more destinations. This includes SaaS applications, applications delivered from multiple brokers, multiple operating systems, and policy-based variations of the above scenarios. One example of this change is t... read more.

  • April 24, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/17 General Availability of Check Point CloudGuard Network Security with Azure Gateway Load Balancer (Check Point) With CloudGuard, customers can now protect their data, applications and services from potential threats in the cloud with greater security efficacy, and the integration simplifies and improves the design of secure Azure deployments. https://bit.ly/41c0LJV Enable seamless agent upgrades with Citrix WEM (Citrix) Citrix Workspace Environment Management (WEM) agent upgrades are importa... read more.

  • April 21, 2023

By Steve Gold, Posted in Security

Don’t know what a blast radius is, well let’s turn to our friend Wikipedia: “The distance from the source that will be affected when an explosion occurs. A blast radius is often associated with bombs, mines, explosive projectiles (propelled grenades), and other weapons with an explosive charge.” From a security perspective, blast radius is used “to designate the impact that a security breach of one single component has on the overall environment. Reducing the blast radius of a... read more.

  • April 18, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/10 Diving deep into Citrix zero trust architecture (Citrix) As enterprises migrate toward a mature zero trust architecture, it is important to understand the core concepts of how to design the architecture and how to configure the environment to satisfy the tenets of a zero trust architecture. https://bit.ly/3mj2LAE AI, ChatGPT and Identity Security’s Critical Human Element (CyberArk) As public debate and regulatory scrutiny around artificial intelligence (AI) and machine learning (ML) i... read more.

  • April 14, 2023