Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/23 Why IVIP is reshaping IAM via (Axonius) IVIP fills that gap with a continuous identity intelligence layer that turns fragmented identity data into something teams can trust and act on. And that change is beginning to reshape the entire IAM market. https://www.axonius.com/blog/why-ivip-is-reshaping-iam DLP Monitoring Implementation Framework: From Planning to Production in 90 Days (Cyera) A successful DLP monitoring framework depends on how well the program balances usability and a... read more.

  • March 06, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In The Truman Show (1998), Truman Burbank slowly realizes that his world isn’t random. Every street he walks down, every destination he tries to reach, is subtly redirected or observed. What finally tips him off isn’t a single event, it’s the pattern of where he’s allowed to go and where he isn’t. That idea maps well to CIS Safeguard 8.7: Collect URL Request Audit Logs. In mode... read more.

  • March 04, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In the 1993 film Jurassic Park, there’s an iconic scene where Lex Murphy stares at a 3D file system and exclaims, “It’s a Unix system! I know this!” What makes the moment memorable isn’t just the line—it’s the idea that understanding the underlying system reveals what’s really happening behind the scenes. In cybersecurity, DNS query audit logs play a very simi... read more.

  • February 24, 2026

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/16 The strategic SIEM buyer’s guide: Choosing an AI-ready platform for the agentic era (Microsoft) As organizations step into the agentic AI era, the priority shifts to establishing a security foundation that can absorb rapid change without adding operational drag. That requires an architecture built for flexibility—one that brings security data, analytics, and response capabilities together rather than scattering them across aging infrastructure. https://www.microsoft.com/en-us/secu... read more.

  • February 20, 2026

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/9 Endpoint Scarcity, Security Pressure: Why CISOs Are Reassessing the Risk at the Edge (IGEL) As storage and memory constraints intensify, organizations are being forced to reassess whether traditional endpoint operating systems and refresh cycles still make financial and operational sense. Anchoring productivity, security, and user experience to increasingly resource-intensive endpoints create growing risk, not only to budgets, but also to business continuity. https://www.igel.com/blog/when-har... read more.

  • February 13, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In The Bourne Identity, Jason Bourne is a man on the run, trying to piece together his past while evading a global intelligence network. The agencies chasing him rely heavily on surveillance, communications intercepts, and, most importantly, detailed logs of his movements, interactions, and digital footprints. Without those logs, they’d have no way to reconstruct his path or understand how he keeps sl... read more.

  • February 10, 2026

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/2 Why Citrix is the most complete EUC platform (Citrix) Enterprises need a solution that addresses today’s challenges and prepares them for tomorrow. Citrix delivers by continuously enhancing our platform with features that improve performance, security, and management. https://www.citrix.com/blogs/2026/01/26/why-citrix-is-the-most-complete-euc-platform/ Microsoft fixes Outlook bug blocking access to encrypted emails Microsoft has fixed a known issue that prevented Microsoft 365 customer... read more.

  • February 06, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In Back to the Future, time is everything. Doc Brown’s DeLorean time machine relies on precise synchronization to travel to specific moments in history. A miscalculation of even a few seconds could mean arriving in the wrong year, or worse, the wrong timeline. In cybersecurity, time synchronization isn’t about time travel, but it’s just as critical. CIS Safeguard 8.4 emphasizes the need to... read more.

  • February 04, 2026

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/26 A strong EUC and cloud strategy isn’t one-size-fits-all. It’s about identifying the solutions that make the most sense for your business. Gotham delivers tailored EUC solutions that align directly with your business objectives, driving productivity, security, and scalability. If you are a current Gotham customer contact your Gotham rep or if you are new to us please contact our Business Development Representative Sierra Birmingham for a link to the full webinar where Gotham’s... read more.

  • January 30, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In Ridley Scott’s The Martian, astronaut Mark Watney is stranded on Mars with limited resources and a damaged habitat. His survival hinges on one critical principle: identify problems quickly and fix them immediately. Whether it’s sealing a breach in the Hab or hacking together a communication system, Watney must detect issues and remediate them immediately for his survival. This is the essence... read more.

  • January 27, 2026