Blog

By Steve Gold, Posted in Security

"Silicon Valley," the hit HBO comedy series that aired from 2014 to 2019, follows the trials and tribulations of Richard Hendricks and his team at Pied Piper as they navigate the competitive world of Silicon Valley with their groundbreaking compression algorithm. One of its core narratives provides a compelling backdrop to discuss the significance of automated backups. Throughout the series, Pied Piper faces multiple data management crises, including near-losses of crucial algorithmic data and intellectual... read more.

  • March 12, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/4 You Don’t Have to Compromise: All-flash Storage Reduces Costs for All Workloads (Pure Storage) Organizations face the challenge of IT cost optimization: balancing burgeoning data demands with constrained budgets. Pure Storage offers an innovative, proven solution that ensures companies can meet their storage needs without compromise. https://blog.purestorage.com/perspectives/you-dont-have-to-compromise-all-flash-storage-reduces-costs-for-all-workloads/ Why EDR is Not Enough (Arctic Wolf... read more.

  • March 08, 2024

By Steve Gold, Posted in Security

What better way to articulate a Data Recovery Process than map it to a Star Trek: The Next Generation episode. In “Disaster” (Season 5, Episode 5), the Enterprise-D strikes a quantum filament that cripples the starship, showcasing the necessity of robust data recovery strategies in the face of unexpected disasters. "Disaster" illustrates the broad scope of data recovery activities, as the crew faces multiple system failures. Data recovery in an organizational context similarly encompasses a wid... read more.

  • March 05, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/19 The State of Security in 2024: The Bad Guys Love AI Too (Pure Storage) AI is allowing the bad guys to scale their attack campaigns. AI is also opening the door for newbie attackers who need little knowledge of coding to launch effective campaigns. Here’s what’s happening right now in security, and why these trends will likely dominate the rest of this year. https://blog.purestorage.com/perspectives/10-security-trends-and-predictions/ The Ins and Outs of Data Privacy, Part 1: The... read more.

  • March 01, 2024

By Steve Gold, Posted in Security

In the movie “Eagle Eye,” two strangers are coerced into a complex plot by a mysterious woman who communicates with them via their electronic devices. The movie showcases how technology can be manipulated to control actions and lead individuals into unintended consequences. While "Eagle Eye" focuses more on the theme of surveillance and artificial intelligence, it indirectly parallels the caution behind disabling autorun features—highlighting the risks associated with allowing external dev... read more.

  • February 29, 2024

By Steve Gold, Posted in Security

I’m not referring to the hit song from Lisa Lisa & Cult Jam, as this is a cybersecurity blog about CIS Controls. But now that the song is in my head, I may have to find a way to integrate it somehow. But I digress. I’m speaking of the infamous “WannaCry” ransomware attack that hit the world back in May 2017. WannaCry exploited vulnerabilities in older versions of Microsoft Windows to encrypt data on infected computers, demanding ransom payments in Bitcoin for decryption keys. Th... read more.

  • February 20, 2024

By Carlo Costanzo, Posted in Infrastructure, Virtualization

Recent developments from Broadcom regarding VMware's offerings have sparked significant discussions within our organization and our client base. As we dive deeper into these changes, I thought I would write this blog post to discuss two recent changes that I have been asked about and their potential impacts. The End of an Era: Discontinuation of ESXi Free With over a decade of availability, VMware has decided to discontinue the free version of its ESXi hypervisor (versions 7.x and 8.x), marking the end of... read more.

  • February 16, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/12 CrowdStrike Defends Against Azure Cross-Tenant Synchronization Attacks (CrowdStrike) As Microsoft Azure continues to gain market share in the cloud infrastructure space, it has garnered attention from adversaries ranging from hacktivist and eCrime threat actors to nation-state adversaries. Recent attacks on Microsoft by cloud-focused threat actors like COZY BEAR are becoming more frequent and garnering huge attention. https://www.crowdstrike.com/blog/crowdstrike-defends-against-azure-cross-te... read more.

  • February 16, 2024

By Steve Gold, Posted in Security

This was the line said by Julius Levinson, played by Judd Hirsch in Independence Day, that changes the direction of the movie from potential annihilation to probable survival. David Levinson (Julian’s son), played by Jeff Goldblum is on the verge of giving up and accepting the fate that aliens will take over the planet. When he hears these words, he thinks about a cold, then a virus, and then a computer virus. David creates a computer virus (aka malware) that can infect alien ships, disable their def... read more.

  • February 13, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/5 ICYMI: Gotham CTO Ken Phelan and Nutanix Senior Vice President of Solution Sales Mike Phelan met to discuss the cost effectiveness of hybrid cloud solutions as cloud providers encourage users to "go native." Click the link below for the full video. https://www.youtube.com/watch?v=vL2My98ISek Tuesday 2/6 Zero Days ft. Bryon Singh, RailWorks Corporation https://www.gothamtg.com/blog/zero-days Architecture Drift: What It Is and How It Leads to Breaches (CrowdStrike) Each time a digital ecosy... read more.

  • February 09, 2024