Critical Remote Code Vulnerability with Apache Log4j
As many of you may be aware by this point, a critical remote code vulnerability was published concerning the Apache Log4j library on December 10, 2021. This vulnerability is being tracked by NIST…Read more
Defense in Depth
Defense-in-Depth. It’s time to revisit an old but tried and true model. Here at WTG we’ve been spending a fair amount of time investigating the landscape that is cyber liability insurance, cyber litigation,…Read more
The Top 12 Healthcare Industry Cyberattacks
Healthcare providers don't have the resources for cutting-edge defenses—and threat actors know this, so health records are a hot and valuable commodity on the dark web. In fact, cyberattacks on healthcare providers have…Read more
Hardening Your Dell Storage Center (SC) – Compellent
Over the last year or so, I’ve helped multiple companies recover from ransomware events utilizing snapshots on their storage arrays. In several of these instances, the customer’s backups were compromised along with their…Read more
VMware: What’s new in vSphere 7.0
On March 10th, VMware announced the newest version of vSphere 7.0, in case you missed the announcement, here are some highlights. vSphere 7.0 comes in two different editions- vSphere 7.0 The new…Read more
Endpoint and Network Security Operations
Let’s talk about endpoint protection strategy and its relation to security operations (SIEM+SOC or MSSP/MDR). While there is sometimes overlap in parts of these technologies, both endpoint and security operations are important. They both…Read more