Author Archives: Matthew Kozloski

About Matthew Kozloski

WTG's Vice President of Professional Services
Microsoft and VMware Partner Up as Microsoft Virtualization Changes Direction

Microsoft and VMware Partner Up as Microsoft Virtualization Changes Direction

Microsoft Hyper-V is going away and is not included in Windows Server 2022.  You’re probably thinking that it wasn’t that long ago that it felt like Microsoft and VMware were the arch-est of archenemies.  Hyper-V and ESX were leapfrogging each other in capabilities and both developed a following.  VMware made a solid foray into public […]

Read More »
Defense in Depth

Defense in Depth

Defense-in-Depth.  It’s time to revisit an old but tried and true model. Here at WTG we’ve been spending a fair amount of time investigating the landscape that is cyber liability insurance, cyber litigation, breach, and loss.  In looking at that landscape, we’ve been reminded of why our NIST CSF / Defense-in-Depth based approach to helping […]

Read More »
vSphere 7.0 U1/U2 Important Upgrade Notice

vSphere 7.0 U1/U2 Important Upgrade Notice

** August 2021 Update ** First, the fine print:  This is suggestive content to be used at your discretion.  Products, processes, and procedures below are not sanctioned, supported, warrantied, or otherwise recommended by WTG, Dell, or other OEMs. We’ve researched this and are making the following suggestion.  For modern Dell servers, for example, you will [...]Read More »

Arctic Wolf’s Response to Kaseya Supply Chain Attack and Takeaways from Matt Kozloski

Response to Kaseya Supply Chain Attack Arctic Wolf is aware of the Kaseya supply chain attack, reportedly affecting between 800 and 1,500 businesses around the world. The Kaseya VSA supply chain ransomware campaign is a sophisticated and intentional attack, the scope of which will not be fully understood for many weeks or possibly months. Any [...]Read More »
Endpoint and Network Security Operations

Endpoint and Network Security Operations

  Let’s talk about endpoint protection strategy and its relation to security operations (SIEM+SOC or MSSP/MDR). While there is sometimes overlap in parts of these technologies, both endpoint and security operations are important. They both play a distinct role in an effective security program. Network sensors “see” activity that endpoints don’t. Endpoint agents are closest to process […]

Read More »
VDI: High CPU Got You Down?

VDI: High CPU Got You Down?

  (TL;DR = scroll down to “Conclusion / The ‘Fix’”) Fortunately, I have the opportunity to see many environments “in-the-wild”, as it were. The downside is running into those annoying conditions where something is obviously wrong (or not operating as expected), without an obvious cause. Over the last year or so, I’ve come across this […]

Read More »