Blog

By Steve Gold, Posted in Security

What better way to articulate a Data Recovery Process than map it to a Star Trek: The Next Generation episode. In “Disaster” (Season 5, Episode 5), the Enterprise-D strikes a quantum filament that cripples the starship, showcasing the necessity of robust data recovery strategies in the face of unexpected disasters. "Disaster" illustrates the broad scope of data recovery activities, as the crew faces multiple system failures. Data recovery in an organizational context similarly encompasses a wid... read more.

  • March 05, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/19 The State of Security in 2024: The Bad Guys Love AI Too (Pure Storage) AI is allowing the bad guys to scale their attack campaigns. AI is also opening the door for newbie attackers who need little knowledge of coding to launch effective campaigns. Here’s what’s happening right now in security, and why these trends will likely dominate the rest of this year. https://blog.purestorage.com/perspectives/10-security-trends-and-predictions/ The Ins and Outs of Data Privacy, Part 1: The... read more.

  • March 01, 2024

By Steve Gold, Posted in Security

In the movie “Eagle Eye,” two strangers are coerced into a complex plot by a mysterious woman who communicates with them via their electronic devices. The movie showcases how technology can be manipulated to control actions and lead individuals into unintended consequences. While "Eagle Eye" focuses more on the theme of surveillance and artificial intelligence, it indirectly parallels the caution behind disabling autorun features—highlighting the risks associated with allowing external dev... read more.

  • February 29, 2024

By Steve Gold, Posted in Security

I’m not referring to the hit song from Lisa Lisa & Cult Jam, as this is a cybersecurity blog about CIS Controls. But now that the song is in my head, I may have to find a way to integrate it somehow. But I digress. I’m speaking of the infamous “WannaCry” ransomware attack that hit the world back in May 2017. WannaCry exploited vulnerabilities in older versions of Microsoft Windows to encrypt data on infected computers, demanding ransom payments in Bitcoin for decryption keys. Th... read more.

  • February 20, 2024

By Carlo Costanzo, Posted in Infrastructure, Virtualization

Recent developments from Broadcom regarding VMware's offerings have sparked significant discussions within our organization and our client base. As we dive deeper into these changes, I thought I would write this blog post to discuss two recent changes that I have been asked about and their potential impacts. The End of an Era: Discontinuation of ESXi Free With over a decade of availability, VMware has decided to discontinue the free version of its ESXi hypervisor (versions 7.x and 8.x), marking the end of... read more.

  • February 16, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/12 CrowdStrike Defends Against Azure Cross-Tenant Synchronization Attacks (CrowdStrike) As Microsoft Azure continues to gain market share in the cloud infrastructure space, it has garnered attention from adversaries ranging from hacktivist and eCrime threat actors to nation-state adversaries. Recent attacks on Microsoft by cloud-focused threat actors like COZY BEAR are becoming more frequent and garnering huge attention. https://www.crowdstrike.com/blog/crowdstrike-defends-against-azure-cross-te... read more.

  • February 16, 2024

By Steve Gold, Posted in Security

This was the line said by Julius Levinson, played by Judd Hirsch in Independence Day, that changes the direction of the movie from potential annihilation to probable survival. David Levinson (Julian’s son), played by Jeff Goldblum is on the verge of giving up and accepting the fate that aliens will take over the planet. When he hears these words, he thinks about a cold, then a virus, and then a computer virus. David creates a computer virus (aka malware) that can infect alien ships, disable their def... read more.

  • February 13, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/5 ICYMI: Gotham CTO Ken Phelan and Nutanix Senior Vice President of Solution Sales Mike Phelan met to discuss the cost effectiveness of hybrid cloud solutions as cloud providers encourage users to "go native." Click the link below for the full video. https://www.youtube.com/watch?v=vL2My98ISek Tuesday 2/6 Zero Days ft. Bryon Singh, RailWorks Corporation https://www.gothamtg.com/blog/zero-days Architecture Drift: What It Is and How It Leads to Breaches (CrowdStrike) Each time a digital ecosy... read more.

  • February 09, 2024

By Steve Gold, Posted in Security

The documentary "Zero Days" sheds light on the complexities of cybersecurity threats, such as the Stuxnet virus, which targeted industrial systems. The film exemplifies the sophisticated nature of modern cyberthreats and underscores the necessity of robust security measures like Domain Name System (DNS) filtering. The case of Stuxnet is a testament to the fact that no enterprise is immune to cyberthreats and proactive measures are essential. The Role of DNS Filtering in Enterprises: Blocking Access to Ma... read more.

  • February 06, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/29 Evergreen//One Recognized as DCIG TOP 5 Storage as-a-Service Solution (Pure Storage) The Data Center Intelligence Group (DCIG) recently recognized Evergreen//One™ from Pure Storage as a DCIG TOP 5 solution in the 2022-23 DCIG TOP 5 Enterprise Storage as a Service Solutions report. https://blog.purestorage.com/products/evergreen-one-recognized-as-dcig-top-5-storage-as-a-service-solution/ 5 Common Privilege Escalation Attack Techniques with Examples (Proofpoint) Privilege escalation is... read more.

  • February 02, 2024