Defense in Depth

Defense in Depth

Defense-in-Depth.  It’s time to revisit an old but tried and true model. Here at WTG we’ve been spending a fair amount of time investigating the landscape that is cyber liability insurance, cyber litigation, breach, and loss.  In looking at that landscape, we’ve been reminded of why our NIST CSF / Defense-in-Depth based approach to helping […]

Read More »
The Top 12 Healthcare Industry Cyberattacks

The Top 12 Healthcare Industry Cyberattacks

Healthcare providers don’t have the resources for cutting-edge defenses—and threat actors know this, so health records are a hot and valuable commodity on the dark web. In fact, cyberattacks on healthcare providers have resulted in 3,705 data breaches and 267 million compromised medical records since 2009, HIPAA Journal reports. In 2020, healthcare was the top industry in […]

Read More »
Hardening Your Dell Storage Center (SC) – Compellent

Hardening Your Dell Storage Center (SC) – Compellent

Over the last year or so, I’ve helped multiple companies recover from ransomware events utilizing snapshots on their storage arrays.  In several of these instances, the customer’s backups were compromised along with their production environment.  A storage array can be a nice part of a recovery strategy, as they seem to be targeted less frequently [...]Read More »
VMware: What’s new in vSphere 7.0

VMware: What’s new in vSphere 7.0

  On March 10th, VMware announced the newest version of vSphere 7.0, in case you missed the announcement, here are some highlights. vSphere 7.0 comes in two different editions- vSphere 7.0 The new generation of vSphere for existing enterprise applications. Two editions Standard and Enterprise Plus vSphere 7.0 with Kubernetes The new generation of vSphere […]

Read More »
Endpoint and Network Security Operations

Endpoint and Network Security Operations

  Let’s talk about endpoint protection strategy and its relation to security operations (SIEM+SOC or MSSP/MDR). While there is sometimes overlap in parts of these technologies, both endpoint and security operations are important. They both play a distinct role in an effective security program. Network sensors “see” activity that endpoints don’t. Endpoint agents are closest to process […]

Read More »
VDI: High CPU Got You Down?

VDI: High CPU Got You Down?

  (TL;DR = scroll down to “Conclusion / The ‘Fix’”) Fortunately, I have the opportunity to see many environments “in-the-wild”, as it were. The downside is running into those annoying conditions where something is obviously wrong (or not operating as expected), without an obvious cause. Over the last year or so, I’ve come across this […]

Read More »