Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/8 Improving Detection and Response: Making the Case for Deceptions (Proofpoint) How can you find and stop attackers more quickly? The answer lies in your approach. Let’s take a closer look at how security teams typically try to detect attackers. Then, we can better understand why deceptions can work better.  https://www.proofpoint.com/us/blog/identity-threat-defense/deception-technology-better-for-threat-detection-response-than-honeypots The Continuing Rise of Remote Code Execution (... read more.

  • April 12, 2024

By Steve Gold, Posted in Security

The iconic line uttered by Agent Smith, played by Hugo Weaving, to Thomas A. Anderson, aka Neo, played by Keanu Reeves, in The Matrix. If you’ve been living under a rock or in a good sized closet, The Matrix tells the story of how Neo is awakened to the reality that his entire existence has been within a digital simulation, leading him on a journey to fight against the machines that have enslaved humanity. This awakening is akin to the realization organizations must reach about the importance of cyber... read more.

  • April 09, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/1 Citrix Autoscale: Unlock better user experiences, maximize resource utilization, and achieve better cost management (Citrix) Citrix Autoscale is designed to help customers address these challenges by scaling resources based on real-time demand such as peak times, schedules, and session (single or multi-session) type in your on-premises and cloud environments. https://www.citrix.com/blogs/2024/03/29/citrix-autoscale-unlock-better-user-experiences-maximize-resource-utilization-and-achieve-better... read more.

  • April 05, 2024

By Steve Gold, Posted in Security

If you think hackers are only trying to get to your Windows machines, well, you’re wrong. In May 2018, the cybersecurity world was rocked by the discovery of VPNFilter, a highly sophisticated and destructive piece of malware that targeted routers and network-attached storage devices across the globe. Identified by Cisco's Talos Intelligence Group, VPNFilter highlighted a critical vulnerability in the very backbone of our internet infrastructure, affecting devices from well-known manufacturers, includi... read more.

  • April 03, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/25 Is your VPN reaching End of Maintenance? Don’t let it put you at risk (Check Point) A legacy VPN does one thing and one thing only: it connects remote workers to the company network. The problem is that most employees don’t need, and shouldn’t have, access to the entire network, just to specific applications and data within it. https://blog.checkpoint.com/security/embrace-the-future-of-remote-access-transitioning-from-legacy-vpns-to-sase/ Tuesday 3/26 Barbasol ft. Bryon Si... read more.

  • March 29, 2024

By Timothy Karl, Posted in Infrastructure, Virtualization

In today's age of digital collaboration, using tools like Microsoft Teams in virtual desktop infrastructure (VDI) environments is more important than ever. We've recently had customers ask how well the new Teams client will work in VDI, especially with support for classic Teams ending on June 30th. The new Teams version has some great new features, but there's a catch: it isn’t fully supported on Windows Server 2019 and doesn't work on Windows Server 2016 at all. This can be tricky for businesses usi... read more.

  • March 27, 2024

By Steve Gold, Posted in Security

Jurassic Park demonstrated isolation both in the literal sense, with the park being located on an isolated island, and in the operational sense, where different systems within the park are designed to function independently to prevent cascading failures. This dual approach to isolation is mirrored in the cybersecurity best practice of creating isolated instances of recovery data. The film underscores the consequences of system failures and the lack of adequate isolation measures, particularly when Dennis N... read more.

  • March 26, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/18 Gotham has earned a spot on the 2024 #CRNTechElite250 list, recognizing us as one of the top IT solution providers in North America. We are proud to continue to provide the best service for our customers. @thechannelco Click the link to see the full list. www.CRN.com/TechElite250 Let AI Handle the Heavy Lifting in the Modern SOC (Palo Alto Networks) AI is transforming the SOC landscape by automating mundane tasks like alert triage, allowing even smaller SOC teams to handle large workflows (n... read more.

  • March 22, 2024

By Steve Gold, Posted in Security

"Person of Interest," a science fiction television series that aired from 2011 to 2016, centers around a supercomputer known as "The Machine," designed to predict terrorist acts by monitoring and analyzing surveillance data. However, its capabilities extend far beyond its primary function, touching on themes of privacy, artificial intelligence, and the ethical implications of surveillance. As "The Machine" processes and stores vast amounts of sensitive information, the series showcases the elaborate measur... read more.

  • March 19, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/11 Why Identity Security Is Essential to Cybersecurity Strategy (CyberArk) At the heart of cybersecurity is identity security – the principle that the right people have the right access at the right time. As we venture further into the digital world, protecting the business from modern threats is crucial, which inherently adds complexity, making smart privilege controls a must-have step toward an identity-first strategy. https://www.cyberark.com/resources/blog/why-identity-security-is-esse... read more.

  • March 15, 2024