By Tim Husar, Posted in Infrastructure, Support

Recently, a client became locked out of the HPE ILO Administrative account on six VMware ESXi hosts. The direct route to fixing this involves downtime, and solutions that could be done online couldn’t be found. We were able to review the HPE REST API documentation and resolve the issue by following the steps below. The HPE ESXi must have been installed or updated with the VMware Custom HPE Software. Enable SSH on the target HPE host. Log into the host with the root account or equivalent. Change... read more.

  • May 04, 2023

By Steve Gold, Posted in Security

Okay, so it’s not Christmas time but my hair is getting grayer (whiter) and I’m feeling quite jolly talking about security. And because you’ve been so good reading this blog, you deserve a gift. The gift of reusability. Now, I’m not talking about that button down shirt you wore yesterday on your video calls hanging over your chair. I’m talking about using the same tool you use to inventory your assets to inventory your software. Most commercial tools that do one will also do t... read more.

  • May 02, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/24 Break the Attack Chain—Protect People, Defend Data (Proofpoint) Recently, we’ve seen a rise in cyber criminals “triple dipping” from data exfiltration. They’re getting paid to return stolen data, destroy that stolen data and reveal what modifications were made to the returned data. Global Threat Trends and the Future of Incident Response (Varonis) As organizations have gotten better at recovering from ransomware attacks, threat actors mov... read more.

  • April 28, 2023

By Steve Gold, Posted in Security

Ok, so that’s not exactly what the sign typically says but you should have your own sign that says “No Approval. No Authorization. No Access!” No one wants uninvited guests in their home/party just like no wants unauthorized, unapproved assets on their network. You need the visibility to know who/what is on your network and the ability to remove them if they’re not authorized. Those unauthorized assets can unknowingly expand your blast radius and increase your attack surface. Wheth... read more.

  • April 25, 2023

By Brian Wagner, Posted in Infrastructure, Virtualization

Gotham has been delivering secure applications to client machines for over 20 years. In the past, this was done primarily through local installs, published applications, and virtual desktops. However, the application landscape is changing, and applications are now being delivered from more sources to more destinations. This includes SaaS applications, applications delivered from multiple brokers, multiple operating systems, and policy-based variations of the above scenarios. One example of this change is t... read more.

  • April 24, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/17 General Availability of Check Point CloudGuard Network Security with Azure Gateway Load Balancer (Check Point) With CloudGuard, customers can now protect their data, applications and services from potential threats in the cloud with greater security efficacy, and the integration simplifies and improves the design of secure Azure deployments. Enable seamless agent upgrades with Citrix WEM (Citrix) Citrix Workspace Environment Management (WEM) agent upgrades are importa... read more.

  • April 21, 2023

By Steve Gold, Posted in Security

Don’t know what a blast radius is, well let’s turn to our friend Wikipedia: “The distance from the source that will be affected when an explosion occurs. A blast radius is often associated with bombs, mines, explosive projectiles (propelled grenades), and other weapons with an explosive charge.” From a security perspective, blast radius is used “to designate the impact that a security breach of one single component has on the overall environment. Reducing the blast radius of a... read more.

  • April 18, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/10 Diving deep into Citrix zero trust architecture (Citrix) As enterprises migrate toward a mature zero trust architecture, it is important to understand the core concepts of how to design the architecture and how to configure the environment to satisfy the tenets of a zero trust architecture. AI, ChatGPT and Identity Security’s Critical Human Element (CyberArk) As public debate and regulatory scrutiny around artificial intelligence (AI) and machine learning (ML) i... read more.

  • April 14, 2023

By Steve Gold, Posted in Security

“There can be only one” If you’re a fan of the movie Highlander like I am, you remember that line. Now, we’re not talking about immortals killing each other until only one remains. We’re talking about security and how to get started. Although, if you post comments on that, perhaps I can start another blog, but I digress. CIS agreed with Connor MacLeod of the Clan MacLeod and felt that there can (should) be only one task for people to start their cybersecurity journey and crea... read more.

  • April 11, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/3 Last week, six people in Nashville lost their lives senselessly. Too often, we hear devastating news like this, and then move on, in the hope it never happens to us, or to our families, friends, or colleagues.   Today, Gotham will take six minutes from our days to remember those lost in last week’s tragedy. We ask you do the same, to keep these and all the other victims in your hearts, and to push for change. What’s new with Citrix — March 2023 (Citrix) This year h... read more.

  • April 07, 2023