Blog

By Steve Gold, Posted in Security

“There can be only one” If you’re a fan of the movie Highlander like I am, you remember that line. Now, we’re not talking about immortals killing each other until only one remains. We’re talking about security and how to get started. Although, if you post comments on that, perhaps I can start another blog, but I digress. CIS agreed with Connor MacLeod of the Clan MacLeod and felt that there can (should) be only one task for people to start their cybersecurity journey and crea... read more.

  • April 11, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/3 Last week, six people in Nashville lost their lives senselessly. Too often, we hear devastating news like this, and then move on, in the hope it never happens to us, or to our families, friends, or colleagues.   Today, Gotham will take six minutes from our days to remember those lost in last week’s tragedy. We ask you do the same, to keep these and all the other victims in your hearts, and to push for change. What’s new with Citrix — March 2023 (Citrix) This year h... read more.

  • April 07, 2023

By Steve Gold, Posted in Security

Security: the final frontier. These are the safeguards of the CIS Critical Security Controls. It’s ongoing mission: To protect organizations, To seek out security gaps and misconfigured systems, To boldly go where few security professionals have gone before. Hi, I’m Steve Gold. Cybersecurity Practice Director for Gotham Technology Group and a little bit of a closet Trekkie. I’ve spent my career working for organizations that truly help people. From Wyse Technology, which minimize... read more.

  • April 04, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/27 Protect Passwords, Don’t Just Manage Them: A Game Plan for CIOs and CISOs (CyberArk) Today’s attackers assign a level of value to employees’ passwords they once reserved for privileged users’ credentials. Why? Workers now have a shocking amount of access to sensitive resources. http://bit.ly/3JQqeB5 Simplify Array Monitoring with New App for Splunk (Pure Storage) The new unified app and technical add-on for Splunk simplify monitoring by providing performance metrics... read more.

  • March 31, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/20 What Is Zero Trust and Why Is it So Important? (CyberArk) In today’s world, the rapid pace of digital transformation, increased use of cloud services and adoption of hybrid work has created a continually shifting enterprise environment that’s chaotic and difficult to secure. http://bit.ly/401mcg4 CrowdStrike Extends Identity Security Innovations to Protect Customers and Stop Breaches (CrowdStrike) The only effective way to protect against modern attacks is an adversary-focused s... read more.

  • March 24, 2023

By Timothy Karl, Posted in Infrastructure, Storage, Support

OneDrive is becoming a popular tool to store files as it provides anywhere access and user collaboration. Getting OneDrive to work in VDI can be challenging. Here are some tips and tricks for optimizing OneDrive in VDI: Use Profile Containers – A profile container captures a user’s profile into a virtual disk that is attached to a user’s VDI session. It provides performance that closely matches a local profile with all the benefits of a roaming profile. Using this solution with OneDrive g... read more.

  • March 22, 2023

By Hank Smith, Posted in Uncategorized

Gotham partnered with Nerdio last year as we saw an increase in our customer base, both existing and new, looking at alternative EUC solutions specifically for Azure Virtual Desktop (AVD) and Windows 365 Cloud PC. Nerdio makes the administration of those workloads much easier as compared to the native tools (PowerShell scripts, etc.) that Microsoft provides. With Nerdio, administrators can take advantage of the various auto-scaling features, image management, and overall easy to use GUI. Nerdio is really in... read more.

  • March 21, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/13 Actionable Insights: Increasing Your Organization’s “Risk Efficacy” Through Targeted Controls (Proofpoint) Using actionable insights to assess your cybersecurity measures is key to protecting against potential threats. http://bit.ly/3JxZw1a CISA: Do these three things to toughen up your network against hackers (ZDNet) Cybersecurity agency shares the lessons learned from a red team assessment of a critical infrastructure organization. http://bit.ly/42bWoiW Tuesday 3/14 D... read more.

  • March 17, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/6 FlashBlade//E™: The Dawn of a New //Era for Unstructured Data Storage (Pure Storage) Pure Storage FlashBlade//E delivers the environmental, ease of use, and reliability benefits of all-flash storage for unstructured data workloads, but at a cost competitive to disk-based storage solutions. http://bit.ly/3EVh1FZ Just Because It’s Old Doesn’t Mean You Throw It Away (Including Malware!) (Fortinet) MyDoom (also known as Novarg and Mimail) was first discovered back in 2004. And... read more.

  • March 10, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/27 Security, Productivity and Privacy: Balancing a 3-Legged Stool (Proofpoint) Securing sensitive information can’t be a one-size-fits-all approach because each organization’s definition of sensitive information can be different. http://bit.ly/41ti89u HardBit 2.0 Ransomware (Varonis) Like most modern ransomware threats, HardBit claims to steal sensitive data from their victims, likely upon first gaining access to the network, before launching their payload to encrypt data. http://... read more.

  • March 03, 2023