Author Archives: Matthew Kozloski

About Matthew Kozloski

WTG's Vice President of Professional Services

How an International Financial Institution Utilized NorthstarMS for Managed Service Support

Client Profile and Business Drivers As part of an enterprise-wide initiative to ensure effective management of infrastructure systems, a mid-sized international financial institution with East Coast-based US operations engaged Winslow Technology Group (WTG) for managed service support. The client presented WTG with several challenges that required creative, cost-efficient, and highly- effective solutions. Firstly, the client [...]Read More »
Defense in Depth

Defense in Depth

Defense-in-Depth.  It’s time to revisit an old but tried and true model. Here at WTG we’ve been spending a fair amount of time investigating the landscape that is cyber liability insurance, cyber litigation, breach, and loss.  In looking at that landscape, we’ve been reminded of why our NIST CSF / Defense-in-Depth based approach to helping […]

Read More »
vSphere 7.0 U1/U2 Important Upgrade Notice

vSphere 7.0 U1/U2 Important Upgrade Notice

** August 2021 Update ** First, the fine print:  This is suggestive content to be used at your discretion.  Products, processes, and procedures below are not sanctioned, supported, warrantied, or otherwise recommended by WTG, Dell, or other OEMs. We’ve researched this and are making the following suggestion.  For modern Dell servers, for example, you will [...]Read More »

Arctic Wolf’s Response to Kaseya Supply Chain Attack and Takeaways from Matt Kozloski

Response to Kaseya Supply Chain Attack Arctic Wolf is aware of the Kaseya supply chain attack, reportedly affecting between 800 and 1,500 businesses around the world. The Kaseya VSA supply chain ransomware campaign is a sophisticated and intentional attack, the scope of which will not be fully understood for many weeks or possibly months. Any [...]Read More »
Endpoint and Network Security Operations

Endpoint and Network Security Operations

  Let’s talk about endpoint protection strategy and its relation to security operations (SIEM+SOC or MSSP/MDR). While there is sometimes overlap in parts of these technologies, both endpoint and security operations are important. They both play a distinct role in an effective security program. Network sensors “see” activity that endpoints don’t. Endpoint agents are closest to process […]

Read More »
VDI: High CPU Got You Down?

VDI: High CPU Got You Down?

  (TL;DR = scroll down to “Conclusion / The ‘Fix’”) Fortunately, I have the opportunity to see many environments “in-the-wild”, as it were. The downside is running into those annoying conditions where something is obviously wrong (or not operating as expected), without an obvious cause. Over the last year or so, I’ve come across this […]

Read More »