Citrix Urging Immediate Patch – NetScaler
Citrix urged its customers on Tuesday to immediately patch NetScaler ADC and Gateway appliances exposed online against two actively exploited critical zero-day vulnerabilities. The two zero-days (tracked as CVE-2023-6548 and CVE-2023-6549) impact the NetScaler management interface and expose unpatched NetScaler instances to remote code execution and denial-of-service attacks, respectively. The Citrix Cloud Software Group strongly […]
Happy 9th Birthday, EVOTEK!
As we quickly close in on our first decade in business, I am in complete awe with what we have accomplished. Numbers, growth, and accolades aside, for me, the standout has been our culture and our people. When I started EVOTEK my goal was to build a business founded on conscious capitalism where employees felt safe […]
Identity is an Asset, Treat it as Such
Zero trust has become an overused marketing term that has lost its value. Vendors are claiming to sell you a Zero Trust solution. They cannot. The original intent was to establish that all components of a digital process need validation (e.g., an employee accessing company email). This includes the identity, the devices, the software, the […]
Happy 8th Birthday, EVOTEK!
Years ago, I set an intention to build a company that had three main goals: As our company turns eight, I wanted to share and reflect on how those intentions shape the present and future at EVOTEK. In 2014, I started EVOTEK and envisioned a company that would provide a safe workplace for all our […]
Happy 7th Birthday, EVOTEK
If you had told me this time last year that we would still be adjusting our lives around a global pandemic, I wouldn’t have believed you. What an interesting year it has been for the EVOTEK community, the industry, and the world. For many business leaders, it has been a time to reflect on how much […]
Pandas, Bears, and the Supply Chain Risk
We have entered a new age of cybercrime and data breaches, and to say we are dealing with a complicated environment would be a tremendous understatement. As we look at the current state of information security, we confront threat actors that are patient and extremely strategic, whether from choosing their TTPs or the targeting of […]
The Automation Journey
In this blog series we explored a handful of today’s most pressing automation topics. Of course, there are many other areas across enterprises where automation is driving profound change, like IT operations, the Internet of Thing (IoT), data analytics, business resilience, governance, and compliance. We focused on defining the three levels of automation (i.e., low-level […]
The Case for Security Automation
TEKnically Speaking – Automation, Part 3 We live in an inordinately distracting world. Applications we use both professionally and personally clammer for our attention. Every new email, Tweet, post, chat, or message comes with its unique chime calling us. Our professional lives blur into our personal lives with our smart phones functioning as a mini-office […]
Why a Proactive Approach Matters in DevOps Automation
TEKnically Speaking – Automation, Part 2 Normally I’d be reticent to use two terms that have multiple definitions in an interactive conversation, much less a blog post. However, since this post is part of a larger series, we’ve already covered the various ways automation is used as a term, so let’s define how we are […]
Cyber Resiliency: Are You Approaching Business & Security the Wrong Way?
A series of prominent events have changed the way that we think about how to approach our customer’s security posture. The 2020 Global pandemic changed how many people work – from their homes instead of offices – and forced us to think about what happens to business continuity (fundamentally resilience) plans when operators are unable to […]