Blog

By Steve Gold, Posted in Security

Steve’s Thoughts You may know "Drift Away" is a song by Mentor Williams written in 1970 and originally recorded by John Henry Kurtz on his 1972 album Reunion. Mentor Williams was a country songwriter, and John Henry Kurtz was an actor and swamp rock singer. Dobie Gray then recorded/performed that famous song in 1973. However, that’s not the lesson here, although who doesn’t like useless information? We’re talking configuration drift here folks. Configuration drift refers to the gra... read more.

  • July 11, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/26 Key Takeaways from the State of Zero Trust Report (Fortinet) In April, Fortinet commissioned a survey of 570 IT and security leaders from 31 different countries, covering nearly all industries, including the public sector. The resulting 2023 State of Zero Trust Report provides insight into the progress IT teams are making in implementing their zero-trust strategies. https://bit.ly/3CLKGQj Think Your Secrets are Safe in their Vault? Think Again (Check Point) As organizations grow and develop... read more.

  • July 07, 2023

By Carlo Costanzo, Posted in Infrastructure, Support

While working on some older DL360’s, I ran into the infamous Purple Screen of Death. Similar to Microsoft’s Blue Screen of Death, this occurs when there is a kernel panic in Linux variants that result in a system halt. This typically is due to a driver issue, hardware issue, or in my case, a recent patch. When I patched the system, the ESXi host restarted as normal, but got stuck on a task appropriately called VMK Shutdown: World_DestroyAllUsersWorlds. The task hung for a few minutes and the... read more.

  • July 07, 2023

By Steve Gold, Posted in Security

Steve’s Thoughts Fort Knox is a United States Army post located in Kentucky and is famous for housing the United States Bullion Depository, which holds a significant portion of the country's gold reserves. Fort Knox serves as a symbol of impenetrable security due to its robust physical and technological defenses. Similarly, in the digital realm, secure configuration acts as a virtual Fort Knox for enterprise assets and software, ensuring that they are protected against unauthorized access, data brea... read more.

  • July 05, 2023

By Bert Amodol, Posted in Security

In the wild world of cyber threats, where hackers lurk around every corner, it's time to put on your capes and embrace the power of tabletop exercises. These exercises might not involve actual tables or Olympic-level athleticism, but they do play a crucial role in fortifying your cyber defenses. For a more serious take on tabletop exercises, click here. Preparing for the Cyber Apocalypse: Picture this: a room filled with cybersecurity warriors, armed not with swords but with laptops and a stash of caffei... read more.

  • June 30, 2023

By Bert Amodol, Posted in Security

In today's interconnected digital landscape, where cyber threats loom large, ensuring robust cybersecurity measures is crucial for individuals, businesses, and organizations alike. The complexity and evolving nature of cyber threats necessitates proactive approaches to identify vulnerabilities, assess response capabilities, and enhance incident management. Among the arsenal of cybersecurity tools, tabletop exercises have emerged as a powerful method for preparing and fortifying defenses. Understanding Tabl... read more.

  • June 30, 2023

By Steve Gold, Posted in Security

This blog just leveled up. My good friend and colleague Bryon Singh, Director of Security Operations at Railworks Corporation has agreed to collaborate on this blog to bring not only the WHY but also the WHAT & HOW to becoming more secure. Hope you enjoy! Steve’s Thoughts When it comes to protecting sensitive data, encryption is the secret handshake of the cybersecurity world. It's like the clandestine cult language that ensures your information remains secure and impervious to prying eyes. For... read more.

  • June 28, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/19 Preventing Cyber Attacks is Critical to Improve Healthcare Outcomes (Check Point) Last month, 1 out of every 44 organizations across the United States were impacted by ransomware attacks. Healthcare organizations continue to be among the top 3 most impacted industries. https://bit.ly/3Pkm4pn Six Critical Vulnerabilities Patched with Microsoft’s June Security Update (Arctic Wolf) On June 13, 2023, Microsoft published their June 2023 Security Update which included patches for six vulner... read more.

  • June 23, 2023

By Carlo Costanzo, Posted in Infrastructure

In an article posted last month, Tim Husar demonstrated how to reset an ILO password on a VMware ESXi host without any downtime. Today, I want to show you a different variation of that process, tailored for an older ILO card operating with an earlier version of ESXi. Since we are using tools that are native on the ESXi HPE custom build, depending on which version you are running, you might need to run different tools. In our case, we had an ILO 5 running on a 6.7 ESXi host. We were running through our upgr... read more.

  • June 21, 2023

By Timothy Karl, Posted in Infrastructure

Citrix continues to innovate their Citrix Cloud platform with new enhancements and capabilities. Here are some highlights of some of the recent new enhancements and capabilities that are now available to the public: Citrix Cloud Now Supports Google Cloud Identity Google Cloud Identity is now supported as an identity provider for subscribers. This provides a unified single sign-on experience to access Citrix Workspace and Google resources. Please note this only works for end-user subscribers, it does not s... read more.

  • June 21, 2023