Blog

By Steve Gold, Posted in Security

The iconic line uttered by Agent Smith, played by Hugo Weaving, to Thomas A. Anderson, aka Neo, played by Keanu Reeves, in The Matrix. If you’ve been living under a rock or in a good sized closet, The Matrix tells the story of how Neo is awakened to the reality that his entire existence has been within a digital simulation, leading him on a journey to fight against the machines that have enslaved humanity. This awakening is akin to the realization organizations must reach about the importance of cyber... read more.

  • April 09, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/1 Citrix Autoscale: Unlock better user experiences, maximize resource utilization, and achieve better cost management (Citrix) Citrix Autoscale is designed to help customers address these challenges by scaling resources based on real-time demand such as peak times, schedules, and session (single or multi-session) type in your on-premises and cloud environments. https://www.citrix.com/blogs/2024/03/29/citrix-autoscale-unlock-better-user-experiences-maximize-resource-utilization-and-achieve-better... read more.

  • April 05, 2024

By Steve Gold, Posted in Security

If you think hackers are only trying to get to your Windows machines, well, you’re wrong. In May 2018, the cybersecurity world was rocked by the discovery of VPNFilter, a highly sophisticated and destructive piece of malware that targeted routers and network-attached storage devices across the globe. Identified by Cisco's Talos Intelligence Group, VPNFilter highlighted a critical vulnerability in the very backbone of our internet infrastructure, affecting devices from well-known manufacturers, includi... read more.

  • April 03, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/25 Is your VPN reaching End of Maintenance? Don’t let it put you at risk (Check Point) A legacy VPN does one thing and one thing only: it connects remote workers to the company network. The problem is that most employees don’t need, and shouldn’t have, access to the entire network, just to specific applications and data within it. https://blog.checkpoint.com/security/embrace-the-future-of-remote-access-transitioning-from-legacy-vpns-to-sase/ Tuesday 3/26 Barbasol ft. Bryon Si... read more.

  • March 29, 2024

By Timothy Karl, Posted in Infrastructure, Virtualization

In today's age of digital collaboration, using tools like Microsoft Teams in virtual desktop infrastructure (VDI) environments is more important than ever. We've recently had customers ask how well the new Teams client will work in VDI, especially with support for classic Teams ending on June 30th. The new Teams version has some great new features, but there's a catch: it isn’t fully supported on Windows Server 2019 and doesn't work on Windows Server 2016 at all. This can be tricky for businesses usi... read more.

  • March 27, 2024

By Steve Gold, Posted in Security

Jurassic Park demonstrated isolation both in the literal sense, with the park being located on an isolated island, and in the operational sense, where different systems within the park are designed to function independently to prevent cascading failures. This dual approach to isolation is mirrored in the cybersecurity best practice of creating isolated instances of recovery data. The film underscores the consequences of system failures and the lack of adequate isolation measures, particularly when Dennis N... read more.

  • March 26, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/18 Gotham has earned a spot on the 2024 #CRNTechElite250 list, recognizing us as one of the top IT solution providers in North America. We are proud to continue to provide the best service for our customers. @thechannelco Click the link to see the full list. www.CRN.com/TechElite250 Let AI Handle the Heavy Lifting in the Modern SOC (Palo Alto Networks) AI is transforming the SOC landscape by automating mundane tasks like alert triage, allowing even smaller SOC teams to handle large workflows (n... read more.

  • March 22, 2024

By Steve Gold, Posted in Security

"Person of Interest," a science fiction television series that aired from 2011 to 2016, centers around a supercomputer known as "The Machine," designed to predict terrorist acts by monitoring and analyzing surveillance data. However, its capabilities extend far beyond its primary function, touching on themes of privacy, artificial intelligence, and the ethical implications of surveillance. As "The Machine" processes and stores vast amounts of sensitive information, the series showcases the elaborate measur... read more.

  • March 19, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/11 Why Identity Security Is Essential to Cybersecurity Strategy (CyberArk) At the heart of cybersecurity is identity security – the principle that the right people have the right access at the right time. As we venture further into the digital world, protecting the business from modern threats is crucial, which inherently adds complexity, making smart privilege controls a must-have step toward an identity-first strategy. https://www.cyberark.com/resources/blog/why-identity-security-is-esse... read more.

  • March 15, 2024

By Steve Gold, Posted in Security

"Silicon Valley," the hit HBO comedy series that aired from 2014 to 2019, follows the trials and tribulations of Richard Hendricks and his team at Pied Piper as they navigate the competitive world of Silicon Valley with their groundbreaking compression algorithm. One of its core narratives provides a compelling backdrop to discuss the significance of automated backups. Throughout the series, Pied Piper faces multiple data management crises, including near-losses of crucial algorithmic data and intellectual... read more.

  • March 12, 2024