Blog

By Steve Gold, Posted in Security

Jurassic Park demonstrated isolation both in the literal sense, with the park being located on an isolated island, and in the operational sense, where different systems within the park are designed to function independently to prevent cascading failures. This dual approach to isolation is mirrored in the cybersecurity best practice of creating isolated instances of recovery data. The film underscores the consequences of system failures and the lack of adequate isolation measures, particularly when Dennis N... read more.

  • March 26, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/18 Gotham has earned a spot on the 2024 #CRNTechElite250 list, recognizing us as one of the top IT solution providers in North America. We are proud to continue to provide the best service for our customers. @thechannelco Click the link to see the full list. www.CRN.com/TechElite250 Let AI Handle the Heavy Lifting in the Modern SOC (Palo Alto Networks) AI is transforming the SOC landscape by automating mundane tasks like alert triage, allowing even smaller SOC teams to handle large workflows (n... read more.

  • March 22, 2024

By Steve Gold, Posted in Security

"Person of Interest," a science fiction television series that aired from 2011 to 2016, centers around a supercomputer known as "The Machine," designed to predict terrorist acts by monitoring and analyzing surveillance data. However, its capabilities extend far beyond its primary function, touching on themes of privacy, artificial intelligence, and the ethical implications of surveillance. As "The Machine" processes and stores vast amounts of sensitive information, the series showcases the elaborate measur... read more.

  • March 19, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/11 Why Identity Security Is Essential to Cybersecurity Strategy (CyberArk) At the heart of cybersecurity is identity security – the principle that the right people have the right access at the right time. As we venture further into the digital world, protecting the business from modern threats is crucial, which inherently adds complexity, making smart privilege controls a must-have step toward an identity-first strategy. https://www.cyberark.com/resources/blog/why-identity-security-is-esse... read more.

  • March 15, 2024

By Steve Gold, Posted in Security

"Silicon Valley," the hit HBO comedy series that aired from 2014 to 2019, follows the trials and tribulations of Richard Hendricks and his team at Pied Piper as they navigate the competitive world of Silicon Valley with their groundbreaking compression algorithm. One of its core narratives provides a compelling backdrop to discuss the significance of automated backups. Throughout the series, Pied Piper faces multiple data management crises, including near-losses of crucial algorithmic data and intellectual... read more.

  • March 12, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/4 You Don’t Have to Compromise: All-flash Storage Reduces Costs for All Workloads (Pure Storage) Organizations face the challenge of IT cost optimization: balancing burgeoning data demands with constrained budgets. Pure Storage offers an innovative, proven solution that ensures companies can meet their storage needs without compromise. https://blog.purestorage.com/perspectives/you-dont-have-to-compromise-all-flash-storage-reduces-costs-for-all-workloads/ Why EDR is Not Enough (Arctic Wolf... read more.

  • March 08, 2024

By Steve Gold, Posted in Security

What better way to articulate a Data Recovery Process than map it to a Star Trek: The Next Generation episode. In “Disaster” (Season 5, Episode 5), the Enterprise-D strikes a quantum filament that cripples the starship, showcasing the necessity of robust data recovery strategies in the face of unexpected disasters. "Disaster" illustrates the broad scope of data recovery activities, as the crew faces multiple system failures. Data recovery in an organizational context similarly encompasses a wid... read more.

  • March 05, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/19 The State of Security in 2024: The Bad Guys Love AI Too (Pure Storage) AI is allowing the bad guys to scale their attack campaigns. AI is also opening the door for newbie attackers who need little knowledge of coding to launch effective campaigns. Here’s what’s happening right now in security, and why these trends will likely dominate the rest of this year. https://blog.purestorage.com/perspectives/10-security-trends-and-predictions/ The Ins and Outs of Data Privacy, Part 1: The... read more.

  • March 01, 2024

By Steve Gold, Posted in Security

In the movie “Eagle Eye,” two strangers are coerced into a complex plot by a mysterious woman who communicates with them via their electronic devices. The movie showcases how technology can be manipulated to control actions and lead individuals into unintended consequences. While "Eagle Eye" focuses more on the theme of surveillance and artificial intelligence, it indirectly parallels the caution behind disabling autorun features—highlighting the risks associated with allowing external dev... read more.

  • February 29, 2024

By Steve Gold, Posted in Security

I’m not referring to the hit song from Lisa Lisa & Cult Jam, as this is a cybersecurity blog about CIS Controls. But now that the song is in my head, I may have to find a way to integrate it somehow. But I digress. I’m speaking of the infamous “WannaCry” ransomware attack that hit the world back in May 2017. WannaCry exploited vulnerabilities in older versions of Microsoft Windows to encrypt data on infected computers, demanding ransom payments in Bitcoin for decryption keys. Th... read more.

  • February 20, 2024