Blog

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation The Last of Us” and the Last Line of Defense: Why Remote Wipe Matters in Cybersecurity In HBO’s The Last of Us, society collapses after a fungal infection turns most of humanity into mindless, infected hosts. The few survivors cling to safety behind fortified walls, constantly on guard against threats that could breach their defenses. It’s a gripping metaphor for the modern cybersecurity l... read more.

  • July 29, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/14 XenServer: Powering your present, readying your future, and now available for all workloads (Citrix) XenServer is widening its support statement to embrace all types of workloads. This isn’t just a minor update; it’s a strategic move to address the very real challenges facing our customers today, offering a powerful, cost-effective, and versatile hypervisor for your entire virtualized infrastructure. https://www.citrix.com/blogs/2025/07/09/xenserver-now-available-for-all-workloads... read more.

  • July 25, 2025

By Ed Bratter, Posted in Infrastructure

Security of an Active Directory (AD) infrastructure can be significantly increased by deploying Active Directory Certificate Services (AD CS) and installing certificates on domain controllers (DC). AD CS plays a foundational role for enabling certificate-based security across a range of services in AD. Some notable security enhancements are as follows:  Securing AD communication between domain joined machines. Allow for securing LDAP traffic, which by default is not encrypted. This means that cre... read more.

  • July 22, 2025

By Timothy Karl, Posted in Infrastructure

Microsoft has officially set the end-of-life date for both Exchange Server 2016 and Exchange Server 2019: October 14, 2025. That might sound like a long way off, but in IT terms, it’s right around the corner, especially if your organization still relies on Exchange for SMTP relay, hybrid identity, or legacy app integration. Here’s what’s changing and how to prepare. What’s Replacing Exchange 2016 and 2019? Instead of releasing a new standalone version of Exchange, Microsoft is mov... read more.

  • July 22, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In the TV series 24, Jack Bauer races against the clock to stop cyberattacks, terrorist threats, and national crises. Every second matters. A moment of inaction can lead to disaster. That same urgency applies to CIS Safeguard 4.10, which emphasizes the importance of automatically locking portable end-user devices after a short period of inactivity. Because in cybersecurity, just like in&... read more.

  • July 22, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation The Matrix and the Power of Choosing the Right Reality In the 1999 sci-fi classic The Matrix, Neo is offered a choice: take the red pill and see the truth, or take the blue pill and remain in a fabricated illusion. This iconic moment is more than just cinematic gold, it’s a perfect metaphor for CIS Safeguard 4.9, which urges organizations to configure trusted DNS servers on all enterpri... read more.

  • July 15, 2025

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 7/1 10 Questions to Evaluate Cloud Email Security Solutions (Abnormal AI) Today’s threats to cloud email use AI to impersonate trusted contacts, mimic real workflows, and blend seamlessly into day-to-day communication. To stop these attacks, security teams require solutions that use AI the way attackers do—strategically, contextually, and at scale. https://abnormal.ai/blog/10-questions-to-evaluate-cloud-email-security The Enterprise’s New Cloud: Where Data Went Wrong and How St... read more.

  • July 11, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation Do more with less. That’s the core idea behind CIS Safeguard 4.8, which advises organizations to uninstall or disable unnecessary services on enterprise assets and software. Why? Because every extra service is a potential doorway for attackers. To illustrate this, let’s look at a survival lesson from The Walking Dead. The Walking Dead and the Dangers of Unsecured Doors In The Walking Dead, sur... read more.

  • July 08, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/23 Are You Using Everything in Your Citrix Cloud Subscription? Features like Citrix Enterprise Browser, Remote Browser Isolation (RBI), and Secure Private Access (SPA) are included in many Advanced Plus and Premium subscriptions, but often go unused. https://www.gothamtg.com/blog/are-you-using-everything-in-your-citrix-cloud-subscription Cloud Attacks Retrospective: Evolving Tactics, Familiar Entry Points (Wiz) Cloud environments are growing more complex—but attackers aren’t necess... read more.

  • June 27, 2025

By Timothy Karl, Posted in Infrastructure, Virtualization

If you're using Citrix Cloud DaaS, you may already have access to powerful tools beyond Virtual Apps and Desktops. Features like Citrix Enterprise Browser, Remote Browser Isolation (RBI), and Secure Private Access (SPA) are included in many Advanced Plus and Premium subscriptions, but often go unused. These built-in tools can help improve security, support BYOD, and reduce reliance on third-party solutions without extra cost. What’s Included? Enterprise Browser A secure, policy-controlled browser... read more.

  • June 23, 2025