Blog

By Bert Amodol, Posted in Security

In the wild world of cyber threats, where hackers lurk around every corner, it's time to put on your capes and embrace the power of tabletop exercises. These exercises might not involve actual tables or Olympic-level athleticism, but they do play a crucial role in fortifying your cyber defenses. For a more serious take on tabletop exercises, click here. Preparing for the Cyber Apocalypse: Picture this: a room filled with cybersecurity warriors, armed not with swords but with laptops and a stash of caffei... read more.

  • June 30, 2023

By Bert Amodol, Posted in Security

In today's interconnected digital landscape, where cyber threats loom large, ensuring robust cybersecurity measures is crucial for individuals, businesses, and organizations alike. The complexity and evolving nature of cyber threats necessitates proactive approaches to identify vulnerabilities, assess response capabilities, and enhance incident management. Among the arsenal of cybersecurity tools, tabletop exercises have emerged as a powerful method for preparing and fortifying defenses. Understanding Tabl... read more.

  • June 30, 2023

By Steve Gold, Posted in Security

This blog just leveled up. My good friend and colleague Bryon Singh, Director of Security Operations at Railworks Corporation has agreed to collaborate on this blog to bring not only the WHY but also the WHAT & HOW to becoming more secure. Hope you enjoy! Steve’s Thoughts When it comes to protecting sensitive data, encryption is the secret handshake of the cybersecurity world. It's like the clandestine cult language that ensures your information remains secure and impervious to prying eyes. For... read more.

  • June 28, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/19 Preventing Cyber Attacks is Critical to Improve Healthcare Outcomes (Check Point) Last month, 1 out of every 44 organizations across the United States were impacted by ransomware attacks. Healthcare organizations continue to be among the top 3 most impacted industries. https://bit.ly/3Pkm4pn Six Critical Vulnerabilities Patched with Microsoft’s June Security Update (Arctic Wolf) On June 13, 2023, Microsoft published their June 2023 Security Update which included patches for six vulner... read more.

  • June 23, 2023

By Carlo Costanzo, Posted in Infrastructure

In an article posted last month, Tim Husar demonstrated how to reset an ILO password on a VMware ESXi host without any downtime. Today, I want to show you a different variation of that process, tailored for an older ILO card operating with an earlier version of ESXi. Since we are using tools that are native on the ESXi HPE custom build, depending on which version you are running, you might need to run different tools. In our case, we had an ILO 5 running on a 6.7 ESXi host. We were running through our upgr... read more.

  • June 21, 2023

By Timothy Karl, Posted in Infrastructure

Citrix continues to innovate their Citrix Cloud platform with new enhancements and capabilities. Here are some highlights of some of the recent new enhancements and capabilities that are now available to the public: Citrix Cloud Now Supports Google Cloud Identity Google Cloud Identity is now supported as an identity provider for subscribers. This provides a unified single sign-on experience to access Citrix Workspace and Google resources. Please note this only works for end-user subscribers, it does not s... read more.

  • June 21, 2023

By Steve Gold, Posted in Security

Hopefully, you get the reference above from the SNL skit. I thought about manipulating Billy Joel’s amazing song ”Say Goodbye to Hollywood” but decided to go simpler. OK, let’s get into it. In today's data-driven world, organizations collect and store vast amounts of sensitive information. However, with the growing number of cyber threats and regulatory requirements, securely disposing of data is just as crucial as protecting it. As part of an enterprise's comprehensive data managem... read more.

  • June 21, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/12 Fortinet Converges NGFW and SD-WAN to Protect Traffic Traversing the Entire Azure vWAN Environment (Fortinet) Azure vWAN is a cloud service that brings together networking, security, and routing under a single operational interface, and customers typically use it to provide connectivity between their on-premises data centers, branch offices, and Azure vWANs. https://bit.ly/3p2h1z2 Tuesday 6/13 F5 Published Cybersecurity Research: Performance and Effectiveness on ML/AI Frameworks (F5) Organ... read more.

  • June 19, 2023

By Steve Gold, Posted in Security

To Retain Or Not To Retain? That Is The question. Memorial Day has passed and summer is here. I don’t know about you but each summer I go through my closet in an attempt to de-clutter. As I stand in my closet looking at clothing that doesn’t fit anymore to donate, or ripped/stained/damaged clothing to discard, all I can think about is Data Retention. I know, right! Wouldn’t it be great if you could simply look at your data like you look at your clothing and know whether it should be kept... read more.

  • June 14, 2023

By Carlo Costanzo, Posted in Storage

If you're unfamiliar with Robware's RVTools, you're definitely missing out. This practical tool provides a clean and uncomplicated interface to view essential information about your Virtual Machines. The feature I find most valuable is the SnapShot tab. By pointing RVTools towards your VirtualCenter, you can access a concise list of all VMs with snapshots. Basic details including the date, description, and power state are also conveniently displayed. If you're working with other groups outside your own, RV... read more.

  • June 14, 2023