Blog

By Ryan Lee, Posted in Infrastructure

Leveraging Citrix StoreFront High Availability and Subscription Synchronization As consultants, engineers, and architects we are regularly challenged with complex scenarios each with their own very specific requirements. These scenarios can really put our skill set to the test and require us to sometimes think outside of the box to achieve our customer’s or companies’ end goal. I have been working with Citrix for nearly 12 years in some form or capacity, with the last 5 years geared primarily towards desig... read more.

  • May 23, 2016

By Nancy Rand, Posted in Security

May 19, Softpedia – (International) A quarter of all hacked WordPress sites can be attributed to three plugins. Sucuri conducted an investigation on over 11,485 compromised Web sites and released its “Website Hacked Report” which revealed that during the first 3 months of 2016, 78 percent of hacked Web sites were using the WordPress Content Management System (CMS) platform and found that attackers were primarily using outdated plugins to hack WordPress sites. Outdated plugins included RevSlider, GravityForm... read more.

  • May 20, 2016

By Nancy Rand, Posted in Security

May 18, SC Magazine – (International) Cisco patch blocks DoS vulnerability. Cisco released patches for its Adaptive Security Appliance (ASA) software after security researchers found attackers could alter a memory block, allowing the system to cease transferring traffic and cause a denial-of-service (DoS) situation. The flaw was reportedly linked to an issue in the installation of Internet Control Message Protocol (ICMP) error handling for Internet Protocol Security (IPSec) packets. Source May 18, Securi... read more.

  • May 19, 2016

By Nancy Rand, Posted in Security

May 17, SecurityWeek– (International) Critical vulnerability in Symantec AV Engine exploited by just sending an email. Symantec updated its Antivirus Engine (AVE) addressing a critical memory corruption flaw after a security researcher from Google Project Zero discovered the flaw affected most Symantec and Norton-branded antivirus products and reported the issue related to how the antivirus products handle executables compressed in the ASPack file compressor. The vulnerability can be remotely exploited for... read more.

  • May 18, 2016

By Nancy Rand, Posted in Security

May 16, SecurityWeek – (International) Data leaked from hacker forum Nulled.io. Risk Based Security reported that the popular forum, Nulled.io was compromised after hackers leaked a 1.3Gb archive containing more than 536,000 user account information including usernames, email addresses, hashed passwords, application program interface (API) credentials for payment gateways, authentication logs, and Internet Protocol (IP) addresses, among other data. Researchers are unsure how the Nulled.io database was compr... read more.

  • May 17, 2016

By Ken Phelan, Posted in Training

The Challenger Channel I was at a conference a couple of weeks ago where a speaker talked about The Challenger Customer by Brent Adamson. She encouraged us to read it and of course, I did. The book has several great insights about the current B2B selling environment and since that’s what Gotham does for a living I found it very interesting. Two of the author’s key insights are: Customers are more consensus driven than ever. On average there will be 5.4 decision makers at each customer for ea... read more.

  • May 17, 2016

By Ken Phelan, Posted in

The Challenger Channel I was at a conference a couple of weeks ago where a speaker talked about The Challenger Customer by Brent Adamson. She encouraged us to read it and of course, I did. The book has several great insights about the current B2B selling environment and since that’s what Gotham does for a living I found it very interesting. Two of the author’s key insights are: Customers are more consensus driven than ever. On average there will be 5.4 decision makers at each customer for ea... read more.

  • May 17, 2016

By Nancy Rand, Posted in Security

May 12, SecurityWeek – (International) Adobe patches Flash zero-day exploited in the wild. Adobe updated its Flash Player for Microsoft Windows, Apple Mac, and Linux addressing 25 vulnerabilities including a type confusion, use-after-free, buffer overflow, directory search path, various memory corruption vulnerabilities that can lead to arbitrary code execution, and a zero-day that has been exploited in the wild. Source May 12, Softpedia – (International) 7-Zip 16.0 released to fix gaping security hole.... read more.

  • May 16, 2016

By Nancy Rand, Posted in Security

May 12, SecurityWeek – (International) Google patches more high risk vulnerabilities in Chrome 50. Google released a round of security patches for Chrome 50 addressing five vulnerabilities, three of which were deemed high severity, and include a same origin bypass issue in the Document Object Model (DOM), a same bypass bug in Blink V8 bindings, and a buffer overflow flaw in V8. A directory traversal flaw using the file scheme on Android, and a race condition bug in loader were also patched, among other vuln... read more.

  • May 13, 2016

By Nancy Rand, Posted in Security

May 11, SecurityWeek – (International) Wi-Fi flaw exposes Android devices to attacks. Google and the developers of Wi-Fi Protected Access (WPA) supplicant patched a high severity privilege escalation flaw that is used in the Android operating system (OS) and several other products after SEARCH-LAB researchers determined that the vulnerability can be exploited to write arbitrary values in the wpa_supplicant configuration file, allowing an attacker to execute arbitrary code with elevated privileges or disrupt... read more.

  • May 12, 2016