Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/12 Fortinet Converges NGFW and SD-WAN to Protect Traffic Traversing the Entire Azure vWAN Environment (Fortinet) Azure vWAN is a cloud service that brings together networking, security, and routing under a single operational interface, and customers typically use it to provide connectivity between their on-premises data centers, branch offices, and Azure vWANs. https://bit.ly/3p2h1z2 Tuesday 6/13 F5 Published Cybersecurity Research: Performance and Effectiveness on ML/AI Frameworks (F5) Organ... read more.

  • June 19, 2023

By Carlo Costanzo, Posted in Storage

If you're unfamiliar with Robware's RVTools, you're definitely missing out. This practical tool provides a clean and uncomplicated interface to view essential information about your Virtual Machines. The feature I find most valuable is the SnapShot tab. By pointing RVTools towards your VirtualCenter, you can access a concise list of all VMs with snapshots. Basic details including the date, description, and power state are also conveniently displayed. If you're working with other groups outside your own, RV... read more.

  • June 14, 2023

By Steve Gold, Posted in Security

To Retain Or Not To Retain? That Is The question. Memorial Day has passed and summer is here. I don’t know about you but each summer I go through my closet in an attempt to de-clutter. As I stand in my closet looking at clothing that doesn’t fit anymore to donate, or ripped/stained/damaged clothing to discard, all I can think about is Data Retention. I know, right! Wouldn’t it be great if you could simply look at your data like you look at your clothing and know whether it should be kept... read more.

  • June 14, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/5 What Physical NICs Are Your VMs Using? https://www.gothamtg.com/blog/what-physical-nics-are-your-vms-using Non-disruptive Workload Mobility with ActiveWorkload (Pure Storage) ActiveWorkload is a powerful tool that enables you to move workloads non-disruptively between FlashArray systems. https://bit.ly/43JYtTc Extending Zero Trust OT Security to Meet Air Gap Requirements (Palo Alto Networks) These offerings were designed to help organizations stay secure while adapting to the tremendous am... read more.

  • June 09, 2023

By Steve Gold, Posted in Security

Let’s start today’s blog with a hearty pat on the back and a big ol’ KUDOS! You get it! You can’t protect what you can’t see. You don’t need to write it on the chalkboard 100 times…unless you’re a huge Bart Simpson fan, then go ahead. Of course, we’re not done with gaining visibility into your environment as you’ll see in future posts. So sorry, not sorry. Now that you have your data inventory, it’s important to know who can access your dat... read more.

  • June 06, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/22 The Evolving Landscape of Distributed Application Security: Beyond Network Firewalls (F5) With the dispersion of application services across highly distributed environments, security has become an infinitely more complex endeavor. https://bit.ly/3MNtaRB The Seven Types of Non-human Identities to Secure (CyberArk) Being aware of all the different identity types in your organization and understanding all the different security needs that must be considered are the first steps to building a co... read more.

  • June 02, 2023

By Carlo Costanzo, Posted in Infrastructure, Support

The Scene Recently, we were working with a client who was experiencing packet loss on some network adapters on their systems. The ESXi host was set up in a pretty standard configuration of a vSwitch with two physical NICs connected to it. We’d done a lot of troubleshooting up to this point and wanted to start correlating Virtual Machines to pNICs. The NIC teaming on the vSwitch was set up as a default active/active scenario and was using the route by origin method. This means that when a VM powers u... read more.

  • June 02, 2023

By Steve Gold, Posted in Security

You can’t protect what you can’t see! You can’t protect what you can’t see! You can’t protect what you can’t see!  Anybody seeing a theme here? Establishing a process to inventory where your data lives (on-premises storage, mail platforms, endpoints, mobile devices, cloud storage, cloud infrastructure, blah, blah, blah) is the first step in building a data management framework. The second step is to establish labels for your data to understand what data you shoul... read more.

  • June 01, 2023

By Steve Gold, Posted in Security

If you get the joke behind the title, you’re either as old as I am or spend hours on the Internet searching for 80’s commercials. Either way, good on ya! In 2006, Clive Humby, a British mathematician and data science entrepreneur, coined the phrase “Data is the new oil.” Humby meant that data, like oil, isn't useful in its raw state. It needs to be refined, processed, and turned into something useful; its value lies in its potential. Many others have come up with different interpret... read more.

  • May 23, 2023

By Kevin Santarina, Posted in Security

If you haven’t read tech news in the last week or two, would you have thought twice about clicking on these links if they were embedded into an email? This past month, Google introduced eight new top-level domains that are publicly available for registration. Among them are two very commonly recognized file extensions, .zip and .mov. The .zip extension is one of those file extensions used to indicate to a user that they are about to receive a collection of files, PDFs, documents, installers, etc., a... read more.

  • May 23, 2023