What the Microsoft/ CrowdStrike Incident Teaches Us
Phew. Friday (7/19) was a doozy for WTG and many other Microsoft/CrowdStrike partners and customers. We sincerely hope that everyone who was impacted have moved beyond the incident and continues leveraging one of…Read more
Passwords – friends or foes?
Today we tackle the biggest quagmire known to mankind since its inception. No, I’m not talking about why Jimmy cracked corn, nor why we don’t care (we’re still investigating that one), I’m…Read more
Defense in Depth
Defense-in-Depth. It’s time to revisit an old but tried and true model. Here at WTG we’ve been spending a fair amount of time investigating the landscape that is cyber liability insurance, cyber litigation,…Read more
Hardening Your Dell Storage Center (SC) – Compellent
Over the last year or so, I’ve helped multiple companies recover from ransomware events utilizing snapshots on their storage arrays. In several of these instances, the customer’s backups were compromised along with their…Read more
VMware: What’s new in vSphere 7.0
On March 10th, VMware announced the newest version of vSphere 7.0, in case you missed the announcement, here are some highlights. vSphere 7.0 comes in two different editions- vSphere 7.0 The new…Read more
Endpoint and Network Security Operations
Let’s talk about endpoint protection strategy and its relation to security operations (SIEM+SOC or MSSP/MDR). While there is sometimes overlap in parts of these technologies, both endpoint and security operations are important. They both…Read more