By Steve Gold, Posted in Security

Security: the final frontier. These are the safeguards of the CIS Critical Security Controls. It’s ongoing mission: To protect organizations, To seek out security gaps and misconfigured systems, To boldly go where few security professionals have gone before. Hi, I’m Steve Gold. Cybersecurity Practice Director for Gotham Technology Group and a little bit of a closet Trekkie. I’ve spent my career working for organizations that truly help people. From Wyse Technology, which minimize... read more.

  • April 04, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/27 Protect Passwords, Don’t Just Manage Them: A Game Plan for CIOs and CISOs (CyberArk) Today’s attackers assign a level of value to employees’ passwords they once reserved for privileged users’ credentials. Why? Workers now have a shocking amount of access to sensitive resources. Simplify Array Monitoring with New App for Splunk (Pure Storage) The new unified app and technical add-on for Splunk simplify monitoring by providing performance metrics... read more.

  • March 31, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/20 What Is Zero Trust and Why Is it So Important? (CyberArk) In today’s world, the rapid pace of digital transformation, increased use of cloud services and adoption of hybrid work has created a continually shifting enterprise environment that’s chaotic and difficult to secure. CrowdStrike Extends Identity Security Innovations to Protect Customers and Stop Breaches (CrowdStrike) The only effective way to protect against modern attacks is an adversary-focused s... read more.

  • March 24, 2023

By Timothy Karl, Posted in Infrastructure, Storage, Support

OneDrive is becoming a popular tool to store files as it provides anywhere access and user collaboration. Getting OneDrive to work in VDI can be challenging. Here are some tips and tricks for optimizing OneDrive in VDI: Use Profile Containers – A profile container captures a user’s profile into a virtual disk that is attached to a user’s VDI session. It provides performance that closely matches a local profile with all the benefits of a roaming profile. Using this solution with OneDrive g... read more.

  • March 22, 2023

By Hank Smith, Posted in Uncategorized

Gotham partnered with Nerdio last year as we saw an increase in our customer base, both existing and new, looking at alternative EUC solutions specifically for Azure Virtual Desktop (AVD) and Windows 365 Cloud PC. Nerdio makes the administration of those workloads much easier as compared to the native tools (PowerShell scripts, etc.) that Microsoft provides. With Nerdio, administrators can take advantage of the various auto-scaling features, image management, and overall easy to use GUI. Nerdio is really in... read more.

  • March 21, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/13 Actionable Insights: Increasing Your Organization’s “Risk Efficacy” Through Targeted Controls (Proofpoint) Using actionable insights to assess your cybersecurity measures is key to protecting against potential threats. CISA: Do these three things to toughen up your network against hackers (ZDNet) Cybersecurity agency shares the lessons learned from a red team assessment of a critical infrastructure organization. Tuesday 3/14 D... read more.

  • March 17, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/6 FlashBlade//E™: The Dawn of a New //Era for Unstructured Data Storage (Pure Storage) Pure Storage FlashBlade//E delivers the environmental, ease of use, and reliability benefits of all-flash storage for unstructured data workloads, but at a cost competitive to disk-based storage solutions. Just Because It’s Old Doesn’t Mean You Throw It Away (Including Malware!) (Fortinet) MyDoom (also known as Novarg and Mimail) was first discovered back in 2004. And... read more.

  • March 10, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/27 Security, Productivity and Privacy: Balancing a 3-Legged Stool (Proofpoint) Securing sensitive information can’t be a one-size-fits-all approach because each organization’s definition of sensitive information can be different. HardBit 2.0 Ransomware (Varonis) Like most modern ransomware threats, HardBit claims to steal sensitive data from their victims, likely upon first gaining access to the network, before launching their payload to encrypt data. http://... read more.

  • March 03, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/20 3 Ways Visualization Improves Cloud Asset Management and Security (CrowdStrike) While it’s important to understand the relationships and potential vulnerabilities of your cloud assets, the practice of managing these systems is complicated by the ever-changing nature of cloud environments. Ransomware Roundup – CatB Ransomware (Fortinet) CatB is a reasonably new entrant to the ransomware field, with samples only dating back to December 2022. The ransom demand... read more.

  • February 24, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/13   Make Compliance a Breeze with Modern Log Management (CrowdStrike) While regulations vary by country and industry, nearly every organization must store compliance-relevant information for a certain period of time. The trouble comes when you’ve got an assortment of tools emitting logs in an inconsistent fashion. Machine Creation Services support for catalogs with Azure VM extensions (Citrix) Adding Azure VM extensions to your machine catalogs is a powerful... read more.

  • February 17, 2023