By Kevin Santarina, Posted in Security

If you haven’t read tech news in the last week or two, would you have thought twice about clicking on these links if they were embedded into an email? This past month, Google introduced eight new top-level domains that are publicly available for registration. Among them are two very commonly recognized file extensions, .zip and .mov. The .zip extension is one of those file extensions used to indicate to a user that they are about to receive a collection of files, PDFs, documents, installers, etc., a... read more.

  • May 23, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/15 The Value of Holistic Visibility: Putting it All Together (Arctic Wolf) Organizations have too many tools feeding them more information than their staff can handle, and partially because those tools are siloed off and improperly managed, preventing comprehensive information and complete understanding of what’s happening within an organization’s IT infrastructure. Ransomware Roundup – Maori (Fortinet) FortiGuard Labs recently came across a new ransomw... read more.

  • May 19, 2023

By Steve Gold, Posted in Security

If you’ve ever challenged a rule your parents set, you’ve probably heard the phrase, “As long as you live in my house, you’ll live by my rules”. Sometimes, if you’re lucky, it’s followed up with, “You can do whatever you want when you have your own home”. So, what do these painful childhood memories have to do with security? I’m so glad you asked! Your parents established certain rules/processes to ensure that the home, and everyone in it, is prot... read more.

  • May 16, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/8 The Importance of Identity and Access Management (Arctic Wolf) Proper IAM management is a discipline that involves people, processes, and technologies, and is an ongoing journey that follows what is referred to as the access management lifecycle. Cyber as a Shared Responsibility; How Rubrik and Zscaler Stepped Forward (Rubrik) Over the past few years as ransomware and other threats have increased, private sector companies have embarked on aggressive journeys to reduce... read more.

  • May 12, 2023

By Steve Gold, Posted in Security

Hopefully by now you’re seeing a trend. You need full visibility into your environment and you also need both the visibility and capability to remove any unauthorized assets or software. I know this may seem kind of basic, but remember, we are only at Control 2. Wait till we get to Control 17 and start discussing Incident Response. But let’s not get ahead of ourselves just yet. After all, we are working with a prescriptive, prioritized, and simplified set of best practices. In the previous blog... read more.

  • May 09, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/1 Why Ransomware and Business Email Compromise Remain Top Attack Types (Arctic Wolf) The continued increase in cybercrime and breach attempts is not a new trend. For years now, the percentages have ticked upwards, and though cybersecurity has evolved, so have hackers seeking data, money, or infamy. AI Powers the Branch of the Future, Today (Palo Alto Networks) With the establishment of hybrid work as a long-term trend and the exponential increase in cloud usage, organiza... read more.

  • May 05, 2023

By Tim Husar, Posted in Infrastructure, Support

Recently, a client became locked out of the HPE ILO Administrative account on six VMware ESXi hosts. The direct route to fixing this involves downtime, and solutions that could be done while the hosts were online couldn’t be found. We were able to review the HPE REST API documentation and resolve the issue by following the steps below. The HPE ESXi must have been installed or updated with the VMware Custom HPE Software. Enable SSH on the target HPE host. Log into the host with the root account or... read more.

  • May 04, 2023

By Steve Gold, Posted in Security

Okay, so it’s not Christmas time but my hair is getting grayer (whiter) and I’m feeling quite jolly talking about security. And because you’ve been so good reading this blog, you deserve a gift. The gift of reusability. Now, I’m not talking about that button down shirt you wore yesterday on your video calls hanging over your chair. I’m talking about using the same tool you use to inventory your assets to inventory your software. Most commercial tools that do one will also do t... read more.

  • May 02, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/24 Break the Attack Chain—Protect People, Defend Data (Proofpoint) Recently, we’ve seen a rise in cyber criminals “triple dipping” from data exfiltration. They’re getting paid to return stolen data, destroy that stolen data and reveal what modifications were made to the returned data. Global Threat Trends and the Future of Incident Response (Varonis) As organizations have gotten better at recovering from ransomware attacks, threat actors mov... read more.

  • April 28, 2023

By Steve Gold, Posted in Security

Ok, so that’s not exactly what the sign typically says but you should have your own sign that says “No Approval. No Authorization. No Access!” No one wants uninvited guests in their home/party just like no wants unauthorized, unapproved assets on their network. You need the visibility to know who/what is on your network and the ability to remove them if they’re not authorized. Those unauthorized assets can unknowingly expand your blast radius and increase your attack surface. Wheth... read more.

  • April 25, 2023