<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[NetThunder | Blog]]></title><description><![CDATA[On-Premise Private Cloud with OneClick]]></description><link>https://blog.netthunder.com/</link><image><url>https://blog.netthunder.com/favicon.png</url><title>NetThunder | Blog</title><link>https://blog.netthunder.com/</link></image><generator>Ghost 4.2</generator><lastBuildDate>Wed, 27 Mar 2024 16:27:08 GMT</lastBuildDate><atom:link href="https://blog.netthunder.com/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Top 5 benefits of using the cloud]]></title><description><![CDATA[<!--kg-card-begin: markdown--><ol>
<li>As most cloud providers are breached all your data has already leaked so as long as you have a backup for ransomware there is no need to worry about security--you already have none.</li>
<li>Your employees will be happy because if your internet goes down they get some time off.</li>
<li>The</li></ol>]]></description><link>https://blog.netthunder.com/top-5-benefits-of-using-the-cloud/</link><guid isPermaLink="false">65d4f64bb39db50001fe5d03</guid><dc:creator><![CDATA[Parker Schmitt]]></dc:creator><pubDate>Tue, 20 Feb 2024 19:10:19 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><ol>
<li>As most cloud providers are breached all your data has already leaked so as long as you have a backup for ransomware there is no need to worry about security--you already have none.</li>
<li>Your employees will be happy because if your internet goes down they get some time off.</li>
<li>The IRS will be happy because the sluggish nature of cloud-based applications will require your staff to work more hours and therefore will increase your tax burden.</li>
<li>You don&apos;t have to create a ransomware plan as cloud can raise prices--which is effectively ransomware.</li>
<li>You will help our major &quot;big-tech-overlords&quot; as they will mine your data and replace you. They are benevolent and we are their property. You owe them your intellectual property afterall.</li>
</ol>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[2023 Events for NetThunder by Ray Diggs]]></title><description><![CDATA[<p>A 2023 Spring Weekend @ThotCon Chicago, Integr8 Detroit, RSA SAn Francisco</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netthunder.com/content/images/2023/05/B0620FB8-982D-4A48-9A01-DDB7FFB35E84_1_102_o.jpeg" class="kg-image" alt loading="lazy" width="2000" height="1500" srcset="https://blog.netthunder.com/content/images/size/w600/2023/05/B0620FB8-982D-4A48-9A01-DDB7FFB35E84_1_102_o.jpeg 600w, https://blog.netthunder.com/content/images/size/w1000/2023/05/B0620FB8-982D-4A48-9A01-DDB7FFB35E84_1_102_o.jpeg 1000w, https://blog.netthunder.com/content/images/size/w1600/2023/05/B0620FB8-982D-4A48-9A01-DDB7FFB35E84_1_102_o.jpeg 1600w, https://blog.netthunder.com/content/images/2023/05/B0620FB8-982D-4A48-9A01-DDB7FFB35E84_1_102_o.jpeg 2048w" sizes="(min-width: 720px) 720px"><figcaption>Conference Exhibits</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netthunder.com/content/images/2023/05/54B0ACE4-53C1-4DCC-990F-533D1D939754_1_102_o.jpeg" class="kg-image" alt loading="lazy" width="2000" height="1500" srcset="https://blog.netthunder.com/content/images/size/w600/2023/05/54B0ACE4-53C1-4DCC-990F-533D1D939754_1_102_o.jpeg 600w, https://blog.netthunder.com/content/images/size/w1000/2023/05/54B0ACE4-53C1-4DCC-990F-533D1D939754_1_102_o.jpeg 1000w, https://blog.netthunder.com/content/images/size/w1600/2023/05/54B0ACE4-53C1-4DCC-990F-533D1D939754_1_102_o.jpeg 1600w, https://blog.netthunder.com/content/images/2023/05/54B0ACE4-53C1-4DCC-990F-533D1D939754_1_102_o.jpeg 2048w" sizes="(min-width: 720px) 720px"><figcaption>Hak4Kids Enthusiasts Parker, Faraday, Joviette, and Kid</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netthunder.com/content/images/2023/05/7B62C840-5E76-44C2-8E15-6DA9A89AF43A_1_102_o.jpeg" class="kg-image" alt loading="lazy" width="2000" height="1500" srcset="https://blog.netthunder.com/content/images/size/w600/2023/05/7B62C840-5E76-44C2-8E15-6DA9A89AF43A_1_102_o.jpeg 600w, https://blog.netthunder.com/content/images/size/w1000/2023/05/7B62C840-5E76-44C2-8E15-6DA9A89AF43A_1_102_o.jpeg 1000w, https://blog.netthunder.com/content/images/size/w1600/2023/05/7B62C840-5E76-44C2-8E15-6DA9A89AF43A_1_102_o.jpeg 1600w, https://blog.netthunder.com/content/images/2023/05/7B62C840-5E76-44C2-8E15-6DA9A89AF43A_1_102_o.jpeg 2048w" sizes="(min-width: 720px) 720px"><figcaption>Parker/NetThunder and Kasi/GCSI</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netthunder.com/content/images/2023/05/AC4B9146-A36A-40FB-A50C-2B02C7F9CDF4_1_102_o.jpeg" class="kg-image" alt loading="lazy" width="2000" height="1500" srcset="https://blog.netthunder.com/content/images/size/w600/2023/05/AC4B9146-A36A-40FB-A50C-2B02C7F9CDF4_1_102_o.jpeg 600w, https://blog.netthunder.com/content/images/size/w1000/2023/05/AC4B9146-A36A-40FB-A50C-2B02C7F9CDF4_1_102_o.jpeg 1000w, https://blog.netthunder.com/content/images/size/w1600/2023/05/AC4B9146-A36A-40FB-A50C-2B02C7F9CDF4_1_102_o.jpeg 1600w, https://blog.netthunder.com/content/images/2023/05/AC4B9146-A36A-40FB-A50C-2B02C7F9CDF4_1_102_o.jpeg 2048w" sizes="(min-width: 720px) 720px"><figcaption>Ferrari Mondial one of only 96 made ...Driven by Crockett &amp; Tubbs Miami Vice</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netthunder.com/content/images/2023/05/01E6D81B-3D87-45CE-96B2-B1FDA80FC88B_1_102_o.jpeg" class="kg-image" alt loading="lazy" width="2000" height="1500" srcset="https://blog.netthunder.com/content/images/size/w600/2023/05/01E6D81B-3D87-45CE-96B2-B1FDA80FC88B_1_102_o.jpeg 600w, https://blog.netthunder.com/content/images/size/w1000/2023/05/01E6D81B-3D87-45CE-96B2-B1FDA80FC88B_1_102_o.jpeg 1000w, https://blog.netthunder.com/content/images/size/w1600/2023/05/01E6D81B-3D87-45CE-96B2-B1FDA80FC88B_1_102_o.jpeg 1600w, https://blog.netthunder.com/content/images/2023/05/01E6D81B-3D87-45CE-96B2-B1FDA80FC88B_1_102_o.jpeg 2048w" sizes="(min-width: 720px) 720px"><figcaption>Bourbon Buffet After PaRtY - Wes, Ray, Juan, Brian, Ron&#xA0;</figcaption></figure>]]></description><link>https://blog.netthunder.com/2023-events-for-netthunder/</link><guid isPermaLink="false">646eeebcb39db50001fe5c52</guid><dc:creator><![CDATA[raydiggs]]></dc:creator><pubDate>Thu, 25 May 2023 05:52:51 GMT</pubDate><content:encoded><![CDATA[<p>A 2023 Spring Weekend @ThotCon Chicago, Integr8 Detroit, RSA SAn Francisco</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netthunder.com/content/images/2023/05/B0620FB8-982D-4A48-9A01-DDB7FFB35E84_1_102_o.jpeg" class="kg-image" alt loading="lazy" width="2000" height="1500" srcset="https://blog.netthunder.com/content/images/size/w600/2023/05/B0620FB8-982D-4A48-9A01-DDB7FFB35E84_1_102_o.jpeg 600w, https://blog.netthunder.com/content/images/size/w1000/2023/05/B0620FB8-982D-4A48-9A01-DDB7FFB35E84_1_102_o.jpeg 1000w, https://blog.netthunder.com/content/images/size/w1600/2023/05/B0620FB8-982D-4A48-9A01-DDB7FFB35E84_1_102_o.jpeg 1600w, https://blog.netthunder.com/content/images/2023/05/B0620FB8-982D-4A48-9A01-DDB7FFB35E84_1_102_o.jpeg 2048w" sizes="(min-width: 720px) 720px"><figcaption>Conference Exhibits</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netthunder.com/content/images/2023/05/54B0ACE4-53C1-4DCC-990F-533D1D939754_1_102_o.jpeg" class="kg-image" alt loading="lazy" width="2000" height="1500" srcset="https://blog.netthunder.com/content/images/size/w600/2023/05/54B0ACE4-53C1-4DCC-990F-533D1D939754_1_102_o.jpeg 600w, https://blog.netthunder.com/content/images/size/w1000/2023/05/54B0ACE4-53C1-4DCC-990F-533D1D939754_1_102_o.jpeg 1000w, https://blog.netthunder.com/content/images/size/w1600/2023/05/54B0ACE4-53C1-4DCC-990F-533D1D939754_1_102_o.jpeg 1600w, https://blog.netthunder.com/content/images/2023/05/54B0ACE4-53C1-4DCC-990F-533D1D939754_1_102_o.jpeg 2048w" sizes="(min-width: 720px) 720px"><figcaption>Hak4Kids Enthusiasts Parker, Faraday, Joviette, and Kid</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netthunder.com/content/images/2023/05/7B62C840-5E76-44C2-8E15-6DA9A89AF43A_1_102_o.jpeg" class="kg-image" alt loading="lazy" width="2000" height="1500" srcset="https://blog.netthunder.com/content/images/size/w600/2023/05/7B62C840-5E76-44C2-8E15-6DA9A89AF43A_1_102_o.jpeg 600w, https://blog.netthunder.com/content/images/size/w1000/2023/05/7B62C840-5E76-44C2-8E15-6DA9A89AF43A_1_102_o.jpeg 1000w, https://blog.netthunder.com/content/images/size/w1600/2023/05/7B62C840-5E76-44C2-8E15-6DA9A89AF43A_1_102_o.jpeg 1600w, https://blog.netthunder.com/content/images/2023/05/7B62C840-5E76-44C2-8E15-6DA9A89AF43A_1_102_o.jpeg 2048w" sizes="(min-width: 720px) 720px"><figcaption>Parker/NetThunder and Kasi/GCSI</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netthunder.com/content/images/2023/05/AC4B9146-A36A-40FB-A50C-2B02C7F9CDF4_1_102_o.jpeg" class="kg-image" alt loading="lazy" width="2000" height="1500" srcset="https://blog.netthunder.com/content/images/size/w600/2023/05/AC4B9146-A36A-40FB-A50C-2B02C7F9CDF4_1_102_o.jpeg 600w, https://blog.netthunder.com/content/images/size/w1000/2023/05/AC4B9146-A36A-40FB-A50C-2B02C7F9CDF4_1_102_o.jpeg 1000w, https://blog.netthunder.com/content/images/size/w1600/2023/05/AC4B9146-A36A-40FB-A50C-2B02C7F9CDF4_1_102_o.jpeg 1600w, https://blog.netthunder.com/content/images/2023/05/AC4B9146-A36A-40FB-A50C-2B02C7F9CDF4_1_102_o.jpeg 2048w" sizes="(min-width: 720px) 720px"><figcaption>Ferrari Mondial one of only 96 made ...Driven by Crockett &amp; Tubbs Miami Vice</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netthunder.com/content/images/2023/05/01E6D81B-3D87-45CE-96B2-B1FDA80FC88B_1_102_o.jpeg" class="kg-image" alt loading="lazy" width="2000" height="1500" srcset="https://blog.netthunder.com/content/images/size/w600/2023/05/01E6D81B-3D87-45CE-96B2-B1FDA80FC88B_1_102_o.jpeg 600w, https://blog.netthunder.com/content/images/size/w1000/2023/05/01E6D81B-3D87-45CE-96B2-B1FDA80FC88B_1_102_o.jpeg 1000w, https://blog.netthunder.com/content/images/size/w1600/2023/05/01E6D81B-3D87-45CE-96B2-B1FDA80FC88B_1_102_o.jpeg 1600w, https://blog.netthunder.com/content/images/2023/05/01E6D81B-3D87-45CE-96B2-B1FDA80FC88B_1_102_o.jpeg 2048w" sizes="(min-width: 720px) 720px"><figcaption>Bourbon Buffet After PaRtY - Wes, Ray, Juan, Brian, Ron&#xA0;</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netthunder.com/content/images/2023/05/44CB1ED8-0B92-42C6-BF1A-0533B2BF169D.jpeg" class="kg-image" alt loading="lazy" width="2000" height="2667" srcset="https://blog.netthunder.com/content/images/size/w600/2023/05/44CB1ED8-0B92-42C6-BF1A-0533B2BF169D.jpeg 600w, https://blog.netthunder.com/content/images/size/w1000/2023/05/44CB1ED8-0B92-42C6-BF1A-0533B2BF169D.jpeg 1000w, https://blog.netthunder.com/content/images/size/w1600/2023/05/44CB1ED8-0B92-42C6-BF1A-0533B2BF169D.jpeg 1600w, https://blog.netthunder.com/content/images/size/w2400/2023/05/44CB1ED8-0B92-42C6-BF1A-0533B2BF169D.jpeg 2400w" sizes="(min-width: 720px) 720px"><figcaption>WeeDram of 36 Year Old Highland Essence&#xA0;</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netthunder.com/content/images/2023/05/7A81AA61-5285-4EBF-BCAD-52243B43F1EF_1_105_c.jpeg" class="kg-image" alt loading="lazy" width="768" height="1024" srcset="https://blog.netthunder.com/content/images/size/w600/2023/05/7A81AA61-5285-4EBF-BCAD-52243B43F1EF_1_105_c.jpeg 600w, https://blog.netthunder.com/content/images/2023/05/7A81AA61-5285-4EBF-BCAD-52243B43F1EF_1_105_c.jpeg 768w" sizes="(min-width: 720px) 720px"><figcaption>Integr8 Manufacturing Conference Detroit May 2023 and Parker leading the way</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netthunder.com/content/images/2023/05/561411DB-6CD9-41F5-A466-348A04180AF5_1_105_c.jpeg" class="kg-image" alt loading="lazy" width="1024" height="768" srcset="https://blog.netthunder.com/content/images/size/w600/2023/05/561411DB-6CD9-41F5-A466-348A04180AF5_1_105_c.jpeg 600w, https://blog.netthunder.com/content/images/size/w1000/2023/05/561411DB-6CD9-41F5-A466-348A04180AF5_1_105_c.jpeg 1000w, https://blog.netthunder.com/content/images/2023/05/561411DB-6CD9-41F5-A466-348A04180AF5_1_105_c.jpeg 1024w" sizes="(min-width: 720px) 720px"><figcaption>Intergr8 Detroit Parker and David during setup</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netthunder.com/content/images/2023/05/0982EB19-89AD-4E5C-842A-EB82D261020B_1_105_c.jpeg" class="kg-image" alt loading="lazy" width="1024" height="768" srcset="https://blog.netthunder.com/content/images/size/w600/2023/05/0982EB19-89AD-4E5C-842A-EB82D261020B_1_105_c.jpeg 600w, https://blog.netthunder.com/content/images/size/w1000/2023/05/0982EB19-89AD-4E5C-842A-EB82D261020B_1_105_c.jpeg 1000w, https://blog.netthunder.com/content/images/2023/05/0982EB19-89AD-4E5C-842A-EB82D261020B_1_105_c.jpeg 1024w" sizes="(min-width: 720px) 720px"><figcaption>Integr8 Demo Parker and Dennis&#xA0;</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netthunder.com/content/images/2023/05/39903695-9AF7-43C7-AC61-726DFADDCC2B_1_105_c.jpeg" class="kg-image" alt loading="lazy" width="1024" height="768" srcset="https://blog.netthunder.com/content/images/size/w600/2023/05/39903695-9AF7-43C7-AC61-726DFADDCC2B_1_105_c.jpeg 600w, https://blog.netthunder.com/content/images/size/w1000/2023/05/39903695-9AF7-43C7-AC61-726DFADDCC2B_1_105_c.jpeg 1000w, https://blog.netthunder.com/content/images/2023/05/39903695-9AF7-43C7-AC61-726DFADDCC2B_1_105_c.jpeg 1024w" sizes="(min-width: 720px) 720px"><figcaption>Integr8 Wes and Paul talking Arcitecture at the Netthunder Booth</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netthunder.com/content/images/2023/05/DD482E77-3A9D-4B22-9363-3F61EF132389_1_105_c.jpeg" class="kg-image" alt loading="lazy" width="1024" height="768" srcset="https://blog.netthunder.com/content/images/size/w600/2023/05/DD482E77-3A9D-4B22-9363-3F61EF132389_1_105_c.jpeg 600w, https://blog.netthunder.com/content/images/size/w1000/2023/05/DD482E77-3A9D-4B22-9363-3F61EF132389_1_105_c.jpeg 1000w, https://blog.netthunder.com/content/images/2023/05/DD482E77-3A9D-4B22-9363-3F61EF132389_1_105_c.jpeg 1024w" sizes="(min-width: 720px) 720px"><figcaption>RSA Team mates L&gt;r Alex G, Wes D, Parker S, Alex L on our Pacific Coast Balcony</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netthunder.com/content/images/2023/05/0A228656-D759-49A1-B7ED-C85D53D458BD_1_105_c.jpeg" class="kg-image" alt loading="lazy" width="1024" height="768" srcset="https://blog.netthunder.com/content/images/size/w600/2023/05/0A228656-D759-49A1-B7ED-C85D53D458BD_1_105_c.jpeg 600w, https://blog.netthunder.com/content/images/size/w1000/2023/05/0A228656-D759-49A1-B7ED-C85D53D458BD_1_105_c.jpeg 1000w, https://blog.netthunder.com/content/images/2023/05/0A228656-D759-49A1-B7ED-C85D53D458BD_1_105_c.jpeg 1024w" sizes="(min-width: 720px) 720px"><figcaption>RSA April 2023 Alex, Wes, Parker, John Fowlkes at the AON Lounge</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netthunder.com/content/images/2023/05/A2608AB3-BB68-46E3-9A63-FD840BC8F3E7_1_105_c.jpeg" class="kg-image" alt loading="lazy" width="768" height="1024" srcset="https://blog.netthunder.com/content/images/size/w600/2023/05/A2608AB3-BB68-46E3-9A63-FD840BC8F3E7_1_105_c.jpeg 600w, https://blog.netthunder.com/content/images/2023/05/A2608AB3-BB68-46E3-9A63-FD840BC8F3E7_1_105_c.jpeg 768w" sizes="(min-width: 720px) 720px"><figcaption>RSA 2023 Insight Partners Bash w/ Parker, Kasi, and BJ Ferguson Keysite</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netthunder.com/content/images/2023/05/146AA948-072B-4187-9C39-A61FBD97CB8D_1_105_c.jpeg" class="kg-image" alt loading="lazy" width="1024" height="768" srcset="https://blog.netthunder.com/content/images/size/w600/2023/05/146AA948-072B-4187-9C39-A61FBD97CB8D_1_105_c.jpeg 600w, https://blog.netthunder.com/content/images/size/w1000/2023/05/146AA948-072B-4187-9C39-A61FBD97CB8D_1_105_c.jpeg 1000w, https://blog.netthunder.com/content/images/2023/05/146AA948-072B-4187-9C39-A61FBD97CB8D_1_105_c.jpeg 1024w" sizes="(min-width: 720px) 720px"><figcaption>RSA 2023 DOD Bourbon and Cigar Speakeasy&#xA0;</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netthunder.com/content/images/2023/05/EB09204A-AC40-4B9E-AF08-2459EC360E87_1_105_c.jpeg" class="kg-image" alt loading="lazy" width="768" height="1024" srcset="https://blog.netthunder.com/content/images/size/w600/2023/05/EB09204A-AC40-4B9E-AF08-2459EC360E87_1_105_c.jpeg 600w, https://blog.netthunder.com/content/images/2023/05/EB09204A-AC40-4B9E-AF08-2459EC360E87_1_105_c.jpeg 768w" sizes="(min-width: 720px) 720px"><figcaption>RSA 2023 John JOhnson, Wes, and Kasi at oldest private Club Lounge in USA</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netthunder.com/content/images/2023/05/7CBBDDEE-A738-4A0A-99F3-DC8AE3E3EBD4_1_105_c.jpeg" class="kg-image" alt loading="lazy" width="768" height="1024" srcset="https://blog.netthunder.com/content/images/size/w600/2023/05/7CBBDDEE-A738-4A0A-99F3-DC8AE3E3EBD4_1_105_c.jpeg 600w, https://blog.netthunder.com/content/images/2023/05/7CBBDDEE-A738-4A0A-99F3-DC8AE3E3EBD4_1_105_c.jpeg 768w" sizes="(min-width: 720px) 720px"><figcaption>RSA 2023 Pool Party @ Olympic Club</figcaption></figure>]]></content:encoded></item><item><title><![CDATA[Can Converged Information Technology (IT) and Operational Technology (OT) be Secured?]]></title><description><![CDATA[<p>The short answer? <strong>No.</strong> <br><br>Upon recent review of a NIST/NCCoE project guideline for backup/recovery of manufacturing networks, the scope was realistic but frank, pessimistic &#x2013; clearly when IT/OT intertwine an attack is inevitable. Their example started with a business either already breached or was inevitable. The network</p>]]></description><link>https://blog.netthunder.com/is-ransomware-the-rogue-it-equivalent-of-red-team-pen-testing/</link><guid isPermaLink="false">6216a1bdc89be00001b3e78d</guid><dc:creator><![CDATA[Wesley Diggs]]></dc:creator><pubDate>Sat, 30 Apr 2022 00:15:04 GMT</pubDate><content:encoded><![CDATA[<p>The short answer? <strong>No.</strong> <br><br>Upon recent review of a NIST/NCCoE project guideline for backup/recovery of manufacturing networks, the scope was realistic but frank, pessimistic &#x2013; clearly when IT/OT intertwine an attack is inevitable. Their example started with a business either already breached or was inevitable. The network architecture of this &quot;hypothetical&quot; scenario relied on software based security. It employed use of an Industrial Demilitarized Zone (IDMZ) which enables remote monitoring and management (RMM), Cloud, etc., capabilities, but dramatically increases cyberattack surfaces. Its predecessor, the air-gap, was historically successful because of its physical and logical network segmentation. Unfortunately, many have bucked the air-gap, connecting their OT to IT which quickly complexifies security &#x2013; businesses need recovery tools because a breach is all but guaranteed.<br><br>Historically, IT and OT environments were isolated by default (OT predates cyberwarfare and cybercrime by a considerable margin). However, as the internet became more democratized, capable, commercial, and dangerous, there was an understanding amongst manufacturers of the intrinsic lack of OT cybersecurity; many devices and equipment could not support patching, and updates could cause interruptions in production, etc. It was and still is common for these environments to have equipment so expensive they must be maintained for decades instead of being replaced, especially difficult to justify replacing if OT works as-is. However, concurrently to the commercializing of the internet, there was an effort of many to help businesses secure those transformative capabilities &#x2013; a formidable challenge awaited.<br><br>As it stands today, there appears to be a broad, innocent misunderstanding of compliance frameworks and subsequent solutions (products) needed. This has necessitated a Herculean effort from industry and government to provide distilled versions of compliance and education on cybersecurity. This has been an uphill battle as manufacturers of all sizes have been increasingly tempted by specialized capabilities and services which require the internet. These capabilities have lead to justification for compromising the security of an air-gap, and the trend of IT/OT convergence. This unfortunately exposes the insufficient defense of OT security products to the robust offense and community of cybercriminals. Even just a cursory look at the growing frequency and financial impact of cyberattacks highlights the mismatched resources and capabilities of the cybersecurity industry and the impotence of cybersecurity guidelines to effectively communicate<em>.</em><br><br><a href="https://www.idagent.com/blog/60-percent-of-companies-go-out-of-business-after-a-cyberattack/">According</a> to the National Cyber Security Alliance,<strong> 60% of small businesses that are hacked will go out of business within six months.</strong> Therefore, it is evident that most organizations are unprepared for a cyberattack, and also have not tested their backups, or backups are impractical.<br><br>If a criminal in say Russia or China wants to perform some &quot;unsanctioned penetration testing&quot;, they can with little effort cheaply buy ransomware and breaching tools off of the dark web. <strong>If businesses can be shuttered by one person using readily available exploits, a reexamination of what is </strong><em><strong>really</strong></em><strong> valuable and how to </strong><em><strong>practically</strong></em><strong> and </strong><em><strong>effectively</strong></em><strong> protect that value is needed.</strong><br><br>However, even with an air-gap, attacks are always possible and a fast recovery is needed &#x2014; even non-cyber, physical failures such as fires, cut cables, etc. can cause downtime; all backups must be tested and regular monthly backups with test servers and machines are recommended so recovery is well understood. But, there is only one recorded instance of an air-gap being penetrated (Stuxnet in Iran&apos;s Nuclear Program), which required four 0day (never before seen) exploits. If a new Stuxnet is an SMMs biggest concern, well... regardless, having a framework for recovery shows good forethought and fiduciary duty to protect the company&apos;s assets, and is generally far easier to implement than cybersecurity compliance.<br><br><em>&quot;Yes, we know you&apos;ll be breached. Here&apos;s how to recover.&quot; </em>doesn&apos;t have the same ring to it as<em> &quot;Yes, we know you&apos;ll be a target. Here&apos;s how to secure your valuables.&quot; &#x2013; </em>but at least it&apos;s a start...<br><br>Technology now exists (<strong>NetThunder Spark</strong>) where backups, even with isolated systems, can be performed without downtime and automated recovery is possible without being at the mercy of any outside cloud providers (which are often prohibitively expensive and download time is slow). Furthermore, if any public cloud based systems are used (which is strongly recommend against), all cloud assets should have a local backup as these cloud assets can be attacked. The backup/recovery setup should allow an easy method of &#x201C;going back&#x201D;, and drills are needed to build confidence in that process. While software based segmentation can help, physical/hardware segmentation should always be preferred.</p><p>Manufacturing should have never moved away from provable security architecture. The assumption that a breach is inevitable, <em>performed with little creative and technical effort</em>, is simply too bleak. Maybe it can be prevented with a more digestible and practical guide, but it&apos;s always been possible for businesses to have multiple networks like internally facing and isolated OT, and externally facing IT. Furthermore, factories always have staff on site &#x2013; remote access is unnecessary and dangerous. Imagine for a moment an alternate reality where OT remained isolated. Theoretically, those capable of developing 0day exploits would have to focus on very large enterprises with the ROI to justify their effort, and cyber criminals that rely on crude, pre-programmed ransomware would have to focus on other industries. Instead, businesses are justifying RMM and cloud because they either don&apos;t understand the risks and the tech, or they are big enough to weather an attack. <br><br><strong>If square one was starting with physically segmented OT, located in a secure facility, then a breach would require &quot;0day&quot; exploitation.</strong> However, maintaining true physical and logical segmentation is easier said than done. Without additional staff or automation to manage that segmentation, maintaining an air-gap is burdensome, impractical, or even impossible for SMMs. Stakeholders don&apos;t want to deal with or understand the tech &#x2013; <em>they just want things to work</em>. Now, manufacturers can take advantage of NetThunder&apos;s technology to automate IT and OT infrastructure, dramatically reducing their attack surface by enabling them to easily manage physically segmented networks. <br><br><br><br><br><br></p>]]></content:encoded></item><item><title><![CDATA[Who's to Blame for Downstream Ransomware?]]></title><description><![CDATA[<p>The president of Microsoft, Brad Smith, in response to the SolarWinds breach said, <em>&quot;I think from a software engineering perspective, it&#x2019;s probably fair to say that this is the largest and most sophisticated attack the world has ever seen&quot;</em> <a href="https://www.reuters.com/article/us-cyber-solarwinds-microsoft-idINKBN2AF03R">on a <em>60 Minutes</em> interview</a>. SolarWinds&apos;</p>]]></description><link>https://blog.netthunder.com/good-faith-compliance-is-met-with-zero-trust-downstream/</link><guid isPermaLink="false">620fc982c89be00001b3e3cc</guid><dc:creator><![CDATA[Wesley Diggs]]></dc:creator><pubDate>Wed, 23 Feb 2022 20:30:00 GMT</pubDate><content:encoded><![CDATA[<p>The president of Microsoft, Brad Smith, in response to the SolarWinds breach said, <em>&quot;I think from a software engineering perspective, it&#x2019;s probably fair to say that this is the largest and most sophisticated attack the world has ever seen&quot;</em> <a href="https://www.reuters.com/article/us-cyber-solarwinds-microsoft-idINKBN2AF03R">on a <em>60 Minutes</em> interview</a>. SolarWinds&apos; Orion network monitoring software was <em>poisoned by hackers before it hit distribution, </em>allowing unfettered access to a bounty of networks<em>.</em> The software travelled downstream to business and government shores, delivering payloads that allowed the hacking group codenamed APT29 (Advanced Persistent Threat), aka Cozy Bear, to gain access to tens of thousands of end-users, exposing a clear security deficiency in the High tech vertical. When Microsoft, the Department of Energy Nuclear Research Labs, the NIH, DHS, the Pentagon, the Treasury, etc, are among those on the victim list, it generates the impetus for renewed and careful consideration of how best to <em>harden network security through regulation and compliance models</em>. For too long has software been the exposed underbelly with which hackers at large gain access to sensitive networks. <br><br>Taking a step back, historically, hackers have targeted end-users to gain access, using a variety of methods like phishing, malware, social engineering, etc. But as customer tastes force them to digitalize, many businesses have turned to the specialization of vendors and MSPs; private sector offensive actors (PSOAs) have evolved more sophisticated methods of taking down bigger game at a larger watering hole. <strong>Hackers are able to gain access to thousands, if not millions of users at once by focusing on critical points in supply chains.</strong><br><br>If avoiding cyberthreats is paramount, which<em> should</em> be given the trends, sensitive networks will have to be securely segmented to mitigate damage while maintaining connectivity of non business-critical networks. However, the solution might not be so obvious, since it requires sensitive networks to disconnect from the internet entirely and revert to LAN infrastructure. But, there&apos;s a twist, those networks are going to bring the cloud from out of the sky and into their datacenters. The NetThunder private cloud platform offers an alternative to organizations who want the automation and collaboration offered by a CSP, but have not been able to abandon the security of the air gap, or are unable to deploy one in the first place. This comes with a variety of benefits, namely provable security, but it also lowers TCO by improving the cost:performance of hardware and software with on premises self-hosting.</p><p>The implicit trust of downstream users was exploited and highlighted by the supply-chain attack, exposing security failures and bad data responsibility of these organizations. Attention on upstream vendors and service companies, in particular those with broad access like Kaseya and SolarWinds, through the lens of compliance would dictate that the supply chain must be overhauled &#x2013; the damage is too widespread to tolerate. These two companies were in &quot;good faith compliance,&quot; yet they were still able to pass along compromised software. So ultimately, it is the responsibility of the State to protect the economy by hardening compliance regulations and audits, and the responsibility of the High tech industry to simplify compliance with innovative tech. </p><p>As the world grows increasingly interconnected, interdependent, and interoperable, and as more business-critical networks are exposed, the possibility of those networks being accessed never goes away in any reliable or provable way. Deploying NetThunder&apos;s autonomous private cloud will ensure valuable production and compute cycles are protected with provable security of the air gap. </p>]]></content:encoded></item><item><title><![CDATA[Stuxnet Ironically Highlights Solution to $6 Trillion Cybercrime Industry]]></title><description><![CDATA[<p>The Stuxnet worm was believed to have been first developed around 2005, and depending on who you asked, could have been authored by a number of different hackers (or groups) working in collaboration. For example it was theorized by Kaspersky Labs to have been a project of the Equation Group,</p>]]></description><link>https://blog.netthunder.com/stuxnet-ironically-highlights-solution-to-6-trillion-cybercrime-problem/</link><guid isPermaLink="false">620c0b1cc89be00001b3d887</guid><category><![CDATA[air gap]]></category><category><![CDATA[cybercrime]]></category><category><![CDATA[stuxnet]]></category><dc:creator><![CDATA[Wesley Diggs]]></dc:creator><pubDate>Thu, 17 Feb 2022 22:33:00 GMT</pubDate><content:encoded><![CDATA[<p>The Stuxnet worm was believed to have been first developed around 2005, and depending on who you asked, could have been authored by a number of different hackers (or groups) working in collaboration. For example it was theorized by Kaspersky Labs to have been a project of the Equation Group, a cadre of hackers with potential ties to the NSA. Their reasoning was: Stuxnet used two zero-day exploits found previously in another malware program attributed to the Equation Group. Others however looked at the geopolitical rift between the Neoconservatives and the Middle East, focused on the correlation of detection of new Stuxnet versions to the timeline of milestones in Iran&apos;s Nuclear program. The CIA could have been working together with Israel&apos;s Mossad to develop the worm as a way to delay their nuke program, or even more conspiratorially, perhaps an enemy attempting to frame the two by fomenting discord. <br><br>Regardless of the author&apos;s origins and motivations, the worm&apos;s novel design implemented a layered attack architecture, the most complex ever seen. It utilized four zero-day exploitations and infected millions of devices before reaching its final target inside the nuclear centrifuges of Iran. <em>It is the only recorded instance in the history of computers demonstrating penetration of an air gapped network.</em></p><p><strong>Consider: </strong>how many trillions will be lost due to cybercrime between now and whenever a second penetration is documented?</p><p>But, many have not see Stuxnet as an affirmation of the security of the air gap, after all why go through the trouble of disconnecting a network if it isn&apos;t perfectly immutable? They also willfully ignore the trillions of dollars of cybercrime damage caused annually. <strong>Stuxnet is be a teachable moment for the High tech industry,</strong> <a href="https://www.accenture.com/_acnmedia/pdf-96/accenture-2019-cost-of-cybercrime-study-final.pdf">projected to transfer US$753 billion over the next five years as a result of cybercrime</a> &#x2013; a stark contrast of success and failure in the two security methodologies. The solution is clear for those with sensitive networks<strong> &#x2013; air gap and restrict access.</strong> <br><br>But a true air gap means manually configuring the network, no trivial feat, and many organizations are allergic to firing their MSP and CSP support &#x2013; a flexible solution must be able to integrate, not replace.<br><br>As such, public clouds are very flexible as long as the customer has an internet connection; automation and feature-rich environments are easy to use and powerful, but ultimately it is vulnerable to attack. Organizations are routinely exploited, global cybercrime damage in 2021 was<strong> <a href="https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/">US$6 trillion</a></strong>, <strong>an evolution of cloud tech must offer the same utility but with better security. </strong>Each dollar taken represents a lost opportunity to futureproof sensitive networks from a chronic problem. </p><p>As White Hats have constantly been outpaced by Black Hats, as consumer demands have forced veteran businesses to go digital and others are born into the digital age, and as computers have transformed from fancy calculators the size of buildings into little world brains that fit in our pockets... so too must cloud IT infrastructure. No one can carry around a CSP datacenter, but <strong>NetThunder&apos;s private cloud can fit on a 1U server, a portable appliance deployable anywhere.</strong><br><br><strong>What is clear is the status quo shouldn&apos;t be sustained.</strong> Taking a hint from the military, securing the nuclear launch network with an air gap, many organizations may <strong>reconsider self-hosting </strong>as the multi-trillion dollar cyberthreat industry looms. Bridging the air gap for organizations, NetThunder&apos;s autonomous private cloud platform defends business- and workflow-critical networks by removing the burden of manual network configuration &#x2013; deploying and maintaining a true air gap was once a complex and uncertain process. Now organizations have the option to<strong> deploy NetThunder&apos;s autonomous private clouds for a flexible network, keeping data secure with an air gap. </strong></p><p></p>]]></content:encoded></item><item><title><![CDATA[The Struggle of Securing your A.I.]]></title><description><![CDATA[<p>The organizations generating the most market value from their products (consumer data) have been those successful at flipping the consumer-producer dynamic on its head. Having successfully marketed a platform for users to provide intimate demographic trends, from social media to search engines, their value generation now is leveraging A.I.</p>]]></description><link>https://blog.netthunder.com/how-is-a-i-spying-on-you/</link><guid isPermaLink="false">620d5a79c89be00001b3dce1</guid><dc:creator><![CDATA[Wesley Diggs]]></dc:creator><pubDate>Wed, 16 Feb 2022 22:30:00 GMT</pubDate><content:encoded><![CDATA[<p>The organizations generating the most market value from their products (consumer data) have been those successful at flipping the consumer-producer dynamic on its head. Having successfully marketed a platform for users to provide intimate demographic trends, from social media to search engines, their value generation now is leveraging A.I. heuristics to identify patterns in large volumes of proprietary consumer data. Instead of selling a product, they offer it for free and then ask for something else valuable in return &#x2014; they offer compelling utility and entertainment, and with COVID-19 making in person visits more difficult, their use has only been reinforced as people have craved company during isolation. </p><p>However, not all organizations monetize privacy invasion, and <strong>HPC assets demonstrate strong ROI across verticals.</strong> Their proliferation can be contextualized by this feedback loop: HPC assets are initially invested in because AI/ML drives novel and unique insight; business value and profitability grow from improved efficiency; excess revenue pays for neural networks to be tweaked, trained, and upgraded for better insights faster; and the process repeats ad infinitum. <br><br>Neural net analysis is broadly useful, so much so that even middlingly large organizations want to employ their use immediately, even with little or no relevant technical expertise. This is why cloud providers are so attractive, their automated platforms and compute resource pools make it easier and cheaper, initially, for an organization to take the first step towards AI/ML. <strong>Depoloying air gapped HPC to bare metal is not trivial.</strong> They are manually configured, hand-built instances which are uniquely configured to suit the needs of each individual organization. <br><br>Unfortunately, human error is endemic to manual configuration &#x2013; complex neural network applications with equally formidable infrastructural substrates could take months of configuration for an internal team or worse, expensive consultants, to implement. For example; what if there are poor, confusing, or missing comments describing configuration changes; what if something breaks and another reconfiguration is needed; what if other inefficiencies or poor configurations are discovered that need to be addressed before the project can be completed; what if the scope of reconfiguration grows outside of projected tolerances; or what if critical team members leave? Justifying the interruption of valuable compute cycles to push new configurations is difficult; organizations must <strong>focus on identifying an air gapped infrastructure</strong> <strong>streamlining configuration and change-management capabilities so security can be made practical</strong>.</p><p>For companies trying to glean beneficial insights from existing HPC, <strong>instead of focusing solely on an arms-race defined by compute power, consider the underlying programmatic infrastructure of leading-edge networks.</strong> The powerful automation and system integration of cloud technology is key to providing convenience to customers. On premises enterprise configuration in general is an expensive and delicate task requiring support from IT staff or consultants, and more specifically for HPC and manufacturing, misconfiguration cuts into valuable compute and production cycles. Replacing the bespoke, manual configuration of an air gapped HPC with NetThunder&apos;s automated private cloud infrastructure removes the programmatic burdens of change management and deployment. In response to the off premises IT support model, with concerns over the growing frequency and damages caused by threat actors, NetThunder has developed a private cloud module with all the creature comforts of automation. </p>]]></content:encoded></item><item><title><![CDATA[What's a Better Ransomware Hostage, Supercomputing or Production Cycles?]]></title><description><![CDATA[<p>		Artificial Intelligence (AI), Machine Learning (ML), and Data Science insights are at the forefront of market innovation; neural networks have become a means of survival as Blue Chips look to develop wealth-preservation strategies. Deep-tech plays deploying AI/ML neural nets onto High Performance Computing (HPC) assets are have become ubiquitous</p>]]></description><link>https://blog.netthunder.com/is-data-analysis-an-easier-target-than-manufacturing/</link><guid isPermaLink="false">6206982ac89be00001b3d5f2</guid><dc:creator><![CDATA[Wesley Diggs]]></dc:creator><pubDate>Wed, 16 Feb 2022 21:00:00 GMT</pubDate><content:encoded><![CDATA[<p>		Artificial Intelligence (AI), Machine Learning (ML), and Data Science insights are at the forefront of market innovation; neural networks have become a means of survival as Blue Chips look to develop wealth-preservation strategies. Deep-tech plays deploying AI/ML neural nets onto High Performance Computing (HPC) assets are have become ubiquitous and the benefits of this marriage are obvious; organizations are able to streamline forecasting models, go-to-market strategy, supply-chain logistics, workload efficiency, reflective analysis &#x2013; there are virtually endless relevant applications for AI/ML/HPC. Because of their broad utility, they are becoming ubiquitous as on and off premises compute resources are integrated for hybrid support. A highly valuable, expensive, critical piece of business infrastructure and strategy, connected to the internet for anyone to potentially gain access and control over...? Eerily similar to manufacturing, no?</p><p>		These gains in efficiency are so substantial and pervasive it has caused a global paradigm shift of budgeting and data strategy as organizations and <strong>businesses across all verticals look to modernize</strong>. According to Hyperion Research, <u><a href="https://www.delltechnologies.com/asset/en-us/products/ready-solutions/industry-market/hyperion-hpc-investment-brings-high-returns.pdf">for every $1 invested in HPC, $44 is returned in profit on average</a></u>, opening the floodgates of IT investment. This rapid growth comes with rapidly changing environments, and predators.</p><p>		The growth of HPC has been so prolific it has substantially affected supportive industries within the IT vertical; climate change, chip and hardware manufacturing supply chains, and cyber warfare/crime have all emerged as challenges borne from geopolitics. Data analysis is the weapon of choice for the tech market cap arms-race. Like prying open an oyster to find a pearl, what was once unassailable complexity has been rendered defenseless against data scientists armed with HPC. Everyone wants their oyster, but what else is lurking below?<br> <br>		The <em>convenience</em> of a public cloud comes with <em>exploitable</em> threat surfaces, a non-starter for those with robust security compliance postures. For those security-minded clients, is there a good alternative that offers cloud functionality but without the risk of exposing sensitive data to threat actors? How do air gapped HPC applications modernize their infrastructure <em>without</em> compromising their data? </p><p>		The tedious and delicate process of manually configuring HPC infrastructure makes cloud automation an attractive solution for those precise reasons, but data security concerns, sticky dev environments, and bandwidth fees make that a pipe dream for sensitive HPC endeavors. As HPC applications need tweaks and tunes, the value-add of new functionality is measured in contrast with quantitative analysis of downtime and implementation costs. Now, organizations must consider how much risk they really want to assume if they fall within the parameters of an ideal victim profile for RaaS. <br><br>The market pressure to streamline maneuverability of on premises HPC infrastructure without sacrificing security and confidentiality is relieved by the emergence of NetThunder&#x2019;s private cloud platform. Autonomous deployment happens within calendar minutes, and recovery is performed easily with deterministically calculated configuration, meaning it can reproduce exact replicas of an infrastructure &#x2013; ultimately, flexible infrastructure like that of a CSP.<br> <br>		NetThunder provides a solution for on premises HPC where strategic and financial discussions have centered around concerns of configuration timelines, change-management challenges, and/or generally looking for practical network solutions for maintaining a secure air gap. As NetThunder&apos;s modules are deployed to streamline configuration of on premises infrastructure, those <strong>organizations can breathe a sigh of relief as their sensitive networks get placed behind air gaps</strong>, and can look to the future as network flexibility becomes automated, freeing IT teams to focus on other projects. <br><br>		The Storm module, an on premises private cloud platform aimed at HPC-scale deployment, transforms network agility with its proprietary out-of-band autointegration orchestration. Through deployment onto bare-metal, the controller is able to track all resources in the database and identify all dependencies.<strong> Infrastructure can be built, torn down, and rebuilt at a whim and within minutes instead of months through dependency-resolution. </strong>Instances of HPC applications requiring or desiring an air gap need look no further than Storm, designed to deploy itself autonomously without connection to the internet. It has the same change-management and flexibility as cloud but without the risk of cloud threat surfaces. Empowered by automation, infrastructure can be recomposed with a button-press for powerful change-management capabilities. Protected by the air gap, monitoring the electronic perimeter and securing sensitive networks is simplified &#x2013; removing the headaches of security audits. <br><br></p>]]></content:encoded></item><item><title><![CDATA[Who Will You Call To Negotiate Back Control Of Your Factory?]]></title><description><![CDATA[<p>		<a href="https://www.cognyte.com/blog/ransomware_2021/">Manufacturing companies account for almost 30% of all ransomware victims globally, and US companies account for more than half of all victims.</a> <strong>The US auto industry can see the writing on the wall</strong> more clearly than anyone. Focusing on risk mitigation tactics like: carrying cyber insurance policies, cultural promotion of</p>]]></description><link>https://blog.netthunder.com/consider-if-insurers-are-unable-to-assess-cyber-liability-properly-how-can-anyone/</link><guid isPermaLink="false">620c098cc89be00001b3d87a</guid><dc:creator><![CDATA[Wesley Diggs]]></dc:creator><pubDate>Wed, 16 Feb 2022 20:00:00 GMT</pubDate><content:encoded><![CDATA[<p>		<a href="https://www.cognyte.com/blog/ransomware_2021/">Manufacturing companies account for almost 30% of all ransomware victims globally, and US companies account for more than half of all victims.</a> <strong>The US auto industry can see the writing on the wall</strong> more clearly than anyone. Focusing on risk mitigation tactics like: carrying cyber insurance policies, cultural promotion of digital hygiene, and more critically, collaboration within the C-suite to <strong>correctly integrate systems with a secure, flexible infrastructure</strong> can help stem the tide permanently. </p><p>		The lack of accurate threat modeling in the cyber insurance industry means coverage isn&apos;t perfect, or even adequate. &#xA0;While they may be able to cover some damage, they are reticent to assume all risk. Furthermore, there are some consequences that an insurer intrinsically can not provide coverage for; a loss of consumer confidence and/or data, viability after an IP leak, reputational hits, or any number of unpredictable outcomes surrounding ransomware payouts &#x2014; there are catastrophic downsides to weak InfoSec strategy. This should be untenable, but many organizations feel confident in cloud security and their insurance policies and are curtailing security innovation &#x2014; it is a <strong>false sense of security</strong>.<strong> </strong>The cloud infrastructure is ultimately what gets exploited, organizations are required to connect sensitive networks to the internet, and yet the businesses renting resources receive the most scrutiny. </p><p>			As long as networks holding sensitive data are connected to the internet, they are potential targets. Insureds may not have any choice but to use public cloud, perhaps why they carry insurance, but they must accept they are exposing themselves to data breaches and ransomware with increased threat surfaces. Additionally, auto-design IP grows increasingly valuable as global automotive innovation is driven by changing consumer tastes; protecting novel engineering projects for EV and prototype designs is critical as the market trends away from combustion engines. Most pressing, however, is losing control of production. <strong>Instead of having to call an insurer to come do damage control or negotiate with threat actors, protect the data so no call has to be made in the first place.</strong></p>]]></content:encoded></item><item><title><![CDATA[Private Clouds: No Internet? No Problem.]]></title><description><![CDATA[<p>		It&#x2019;s easy to envision on premises High Performance Computing (HPC) budget and strategy meetings focusing on compute and storage bandwidth, rather than consider complex infrastructure overhauls. <em>&#x201C;We need to increase compute cycle efficiency.&#x201D; </em>An easy to understand and quantifiable goal met with nods of approval, <strong>HPC</strong></p>]]></description><link>https://blog.netthunder.com/can-supercomputers-be-deployed-without-the-internet/</link><guid isPermaLink="false">620c0658c89be00001b3d833</guid><dc:creator><![CDATA[Wesley Diggs]]></dc:creator><pubDate>Wed, 16 Feb 2022 19:01:22 GMT</pubDate><content:encoded><![CDATA[<p>		It&#x2019;s easy to envision on premises High Performance Computing (HPC) budget and strategy meetings focusing on compute and storage bandwidth, rather than consider complex infrastructure overhauls. <em>&#x201C;We need to increase compute cycle efficiency.&#x201D; </em>An easy to understand and quantifiable goal met with nods of approval, <strong>HPC efficiency is the paramount concern</strong>. Working alongside compute performance considerations, CISOs must consider responses that fit to more esoteric challenges &#x2014; minimizing cyberthreat liability, an increasingly obscure and insidious adversarial threat. This is no small challenge, and the <strong>risk in failure is quantified directly by a multi-billion dollar Ransomware-as-a-Service</strong> (RaaS) industry. <br><br>		The responsibility of protecting massive proprietary stores of data for analysis, when most thoughtfully considered, begins with prioritizing confidentiality, integrity, and availability (CIA). Critically valuable supercomputing systems are often air gapped, requiring a hand-built configuration of infrastructure to be implemented on premise. Unfortunately, tweaks and tunes must be manually configured, and mistakes could be made during that process. <br><br>		Public cloud allows any business to have IT without any technical prowess, they already have a big shiny virtualized automated 3D printer ready to spit out an IT asset of any size and scale. The dichotomy for businesses is in the imbalance of flexibility and security, having to choose one or the other begs for a market correction. HPC solutions in the cloud automate infrastructure for flexibility and on premise solutions air gap for security. Lawyers and security auditors love complete isolation, too, but the challenges of manual configuration within an air gap are substantial &#x2014; how can the lawyers and the IT staff both get a win? <br><br>		The problem for many is there is no clear path to cutting the cord. For the scissor-less, there are a few major competitive disadvantages they must accept using CSP infrastructure; lock-in from sticky dev environments and tool kits, &#x201C;data gravity&#x201D; issues that make ingress/egress expensive, and the risk of breaches and outages. However, if those two circles could meet in a platform to deploy autonomous clouds on bare-metal anywhere, it would be the best of both worlds. <strong>AI/ML/Data Science systems are most economical and secure in an air gap.</strong> Put down the chisel and flip the switch on the 3D printer. Bridging the gap, the NetThunder platform is an on premise private cloud with the automation needed to make cutting the cord practical &#x2014; <strong>why whittle out a secure network when it can be 3D printed?</strong> <br><br>		Any well implemented HPC project, manufacturing system, sensitive data lake, etc., will have a holistic balance of infrastructural security and flexibility at its foundation. A truly flexible infrastructure is able to deploy and operate anywhere, <em>even after a pair of scissors cuts it off from the world.</em> <br><br>		</p>]]></content:encoded></item><item><title><![CDATA[Cyber Insurance Isn't Enough?]]></title><description><![CDATA[<p>		Stepping in to address the consequences of poor InfoSec strategy and performance, insurance groups have seized the opportunity to offer cyber liability insurance. As businesses host critical data in off premises clouds, the <a href="https://www.prnewswire.com/news-releases/cyber-insurance-market-worth-20-4-billion-by-2025--exclusive-report-by-marketsandmarkets-301150148.html">industry has seen 20% growth every year</a>. The multi-billion dollar <a href="https://www.prnewswire.com/news-releases/cyber-insurance-market-worth-20-4-billion-by-2025--exclusive-report-by-marketsandmarkets-301150148.html">cyber liability industry, valued at $7.8B</a></p>]]></description><link>https://blog.netthunder.com/a-practical-solution-to-security-audits/</link><guid isPermaLink="false">620c1591c89be00001b3d894</guid><dc:creator><![CDATA[Wesley Diggs]]></dc:creator><pubDate>Wed, 16 Feb 2022 18:30:00 GMT</pubDate><content:encoded><![CDATA[<p>		Stepping in to address the consequences of poor InfoSec strategy and performance, insurance groups have seized the opportunity to offer cyber liability insurance. As businesses host critical data in off premises clouds, the <a href="https://www.prnewswire.com/news-releases/cyber-insurance-market-worth-20-4-billion-by-2025--exclusive-report-by-marketsandmarkets-301150148.html">industry has seen 20% growth every year</a>. The multi-billion dollar <a href="https://www.prnewswire.com/news-releases/cyber-insurance-market-worth-20-4-billion-by-2025--exclusive-report-by-marketsandmarkets-301150148.html">cyber liability industry, valued at $7.8B in 2020 is predicted to reach $20.4B in value by 2025</a>. This is largely in part due to the increasing frequency of ransomware and data breaches affecting organizations with easily exploitable security methods. </p><p>		Despite growth, several factors have caused some insurers to pull out of the market, including but not limited to: a <strong>general inability to accurately assess threat</strong> volatility, a dwindling pool of capital to fund losses, systemic risk potential which could affect multiple policyholders simultaneously, and a loss environment caused by substantial ransomware payouts &#x2013; a confluence of events affecting profitability.<strong> What could be more frightening to insurers</strong> than poor predictive ability? The<strong> bad actors</strong> who get access to their databases, <strong>focusing their attention on specific businesses carrying the largest cyber insurance policies</strong>, increasing the value and likelihood of payouts after gaining access. As the digital landscape undergoes rapid changes, predators evolve new weapons and hunting tactics. In response, global InfoSec strategy must grow a thicker hide. Data and business execution must be treated with utmost security across all business verticals.</p><p>		The consequences of insufficient security vision, relaxing posture, can lead to debilitating events the scope of which could greatly outstrip a liability policy. <strong>No insurer can provide coverage for:</strong> <strong>a loss of reputation within the industry, the intangible loss of consumer confidence and their data, or viability after an IP leak</strong> &#x2014; there are catastrophic downsides to weak InfoSec strategy. Evolving risk vectors demand agile and innovative change; with thoughtful and thorough cybersecurity reinforced by solid ethical, financial, and technological vision, the growing sophistication of cyberthreats can be mitigated. This should be untenable given the inadequate coverage offered at the moment by insurers &#x2014; it is a false sense of security. The best way to <strong>truly protect business-critical networks &#x2013; put them inside of an air gap.</strong></p><p>	By segmenting, internal servers holding sensitive data separately from external collaboration servers connected to the internet, security compliance audits are much more simply performed. Insurers should be able to generate an easily underwritten policy, because regardless of the scale and value of the IT asset, it is isolated. If there is no threat surface, accounting for risk is simple. Despite this, only some insurers have been able to overcome methodological and informational gaps to assess cyberthreat risk. As a result, some are able to tailor a policy while others still have more rudimentary modeling and pricing structures. As threat modeling methodology becomes more sophisticated, hopefully insurers design premiums to positively reinforce the costs, expertise, and care taken to deploy secure infrastructure. In the future it would not be surprising to see insurers championing on premise private clouds as best practice to secure IT assets.</p>]]></content:encoded></item><item><title><![CDATA[Ransomware as a Service?]]></title><description><![CDATA[<p><br>		Perhaps more interesting <a href="https://www.marsh.com/us/services/cyber-risk/insights/cyber-insurance-market-overview-q4-2021.html">than insurance premiums growing on average 96%, year-over-year</a>, is considering the growth of the Ransomware-as-a-Service industry. In 2021 the global cost of reported incidents was <a href="https://cybersecurityventures.com/global-ransomware-damage-costs-predicted-to-reach-250-billion-usd-by-2031/">valued at $20B, 57 times more than it was in 2015, and based on 30% annual growth is predicted to reach $265B</a></p>]]></description><link>https://blog.netthunder.com/reducing-the-electronic-perimeter-to-one-point-cyberthreat-security-audits-simplified/</link><guid isPermaLink="false">620be823c89be00001b3d7c4</guid><dc:creator><![CDATA[Wesley Diggs]]></dc:creator><pubDate>Wed, 16 Feb 2022 18:00:00 GMT</pubDate><content:encoded><![CDATA[<p><br>		Perhaps more interesting <a href="https://www.marsh.com/us/services/cyber-risk/insights/cyber-insurance-market-overview-q4-2021.html">than insurance premiums growing on average 96%, year-over-year</a>, is considering the growth of the Ransomware-as-a-Service industry. In 2021 the global cost of reported incidents was <a href="https://cybersecurityventures.com/global-ransomware-damage-costs-predicted-to-reach-250-billion-usd-by-2031/">valued at $20B, 57 times more than it was in 2015, and based on 30% annual growth is predicted to reach $265B by 2031</a>. Cybercrime is the biggest single threat to business today, and with the projected growth, it could be in perpetuity. <br><br>No piece of technology can be called truly secure, cybercriminals will always find a way to gain access with some exploit. But, making as hard as possible for them to gain access is not a bad thing, either. <strong>The solution to hackers is a pair of scissors.</strong> Cutting the cord, despite the trend of moving to the cloud, will keep sensitive data secure. Replacing public cloud support with the option of self-hosting a private cloud on premises, NetThunder makes air gapping practical. </p><p>		For critically sensitive HPC projects, with leadership intractably opposed to remote resources, infrastructure square-one is the air gap; leaders must prioritize security and replacing hand built infrastructure configuration with automation. For a truly flexible infrastructure, a platform needs to: be portable for physical deploy<strong> </strong><em>anywhere</em>, automate what was manually configured, and allow sensitive networks to be truly secured behind an air gap. By offering the same flexibility and ease of deployment, but without any cyberthreat risk, businesses can continue operations uninterrupted with the secure, provable security of an air gap. NetThunder&#x2019;s Storm module is aimed at decoupling liminal HPC instances from the cloud by providing an easy, practical solution for air gapping. </p>]]></content:encoded></item><item><title><![CDATA[How to migrate your Amazon S3 data to NetThunder]]></title><description><![CDATA[<p>Migrating your Amazon S3 data to Net-Thunder is simple, thanks to our platform&apos;s Minio service API and storage auto-expansion capabilities.</p><p>First, set up your Minio service using the Net-Thunder platform by selecting &quot;Add New Service&quot;.</p><figure class="kg-card kg-image-card"><img src="https://blog.netthunder.com/content/images/2020/02/step1.png" class="kg-image" alt loading="lazy"></figure><p>Set the hostname, starting size, and secret/access keys (if you</p>]]></description><link>https://blog.netthunder.com/how-to-migrate-your-amazon-s3-data-to-net-thunder/</link><guid isPermaLink="false">5ee18e05dfde1b0001c3e0bc</guid><dc:creator><![CDATA[Cameron Spry]]></dc:creator><pubDate>Mon, 17 Feb 2020 19:00:00 GMT</pubDate><content:encoded><![CDATA[<p>Migrating your Amazon S3 data to Net-Thunder is simple, thanks to our platform&apos;s Minio service API and storage auto-expansion capabilities.</p><p>First, set up your Minio service using the Net-Thunder platform by selecting &quot;Add New Service&quot;.</p><figure class="kg-card kg-image-card"><img src="https://blog.netthunder.com/content/images/2020/02/step1.png" class="kg-image" alt loading="lazy"></figure><p>Set the hostname, starting size, and secret/access keys (if you want).</p><figure class="kg-card kg-image-card"><img src="https://blog.netthunder.com/content/images/2020/02/step2-1.png" class="kg-image" alt loading="lazy"></figure><p>Wait just a few seconds, and Minio will start up.</p><figure class="kg-card kg-image-card"><img src="https://blog.netthunder.com/content/images/2020/02/step3-1.png" class="kg-image" alt loading="lazy"></figure><p>Get the IP address on the local network and set up an HTTP proxy. If DNS isn&apos;t already configured, add a record for that, too.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netthunder.com/content/images/2020/02/step4-1.png" class="kg-image" alt loading="lazy"><figcaption>Check the IP under &quot;Network Interface&quot; in the NetThunder UI</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netthunder.com/content/images/2020/02/step5-2.png" class="kg-image" alt loading="lazy"><figcaption>Note: Your zone and IP will probably be different!</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netthunder.com/content/images/2020/02/Screenshot_2020-02-17_00-10-09.png" class="kg-image" alt loading="lazy"><figcaption>Command the HTTPProxy service that is on your domain so external hosts can connect</figcaption></figure><p>Download the minio client using the following commands (on Linux):</p><pre><code>wget https://dl.min.io/client/mc/release/linux-amd64/mc
chmod +x mc
</code></pre><p>You can also get the Windows version at <a href="https://dl.min.io/client/mc/release/windows-amd64/mc.exe">https://dl.min.io/client/mc/release/windows-amd64/mc.exe</a></p><p>After downloading mc, you have almost everything that&apos;s needed to migrate from S3.</p><p>All you need now is your Amazon S3 API Access and Secret keys. The easiest way, if you want to migrate everything, is to just use a root access key. To do so, use the dropdown box on Amazon Web Services to select your username, then &quot;Security Credentials&quot;. </p><figure class="kg-card kg-image-card"><img src="https://blog.netthunder.com/content/images/2020/02/step1-1.PNG" class="kg-image" alt loading="lazy"></figure><p>Open the &quot;Access Keys&quot; dropdown and select &quot;Create New Access Key&quot;. A box will pop up with the access and secret key that you will need in the next step.</p><figure class="kg-card kg-image-card"><img src="https://blog.netthunder.com/content/images/2020/02/step2.PNG" class="kg-image" alt loading="lazy"></figure><p><br></p><figure class="kg-card kg-image-card"><img src="https://blog.netthunder.com/content/images/2020/02/step3.PNG" class="kg-image" alt loading="lazy"></figure><pre><code>mc config host add s3 https://s3.amazonaws.com EXAMPLE_ACCESS_KEY EXAMPLE_SECRET_KEY --api S3v4
</code></pre><p>To test that it worked, try listing your S3 buckets:</p><pre><code>$ mc ls s3
[2020-02-16 20:40:32 EST]    0B  testbucket/
</code></pre><p>Next, add your NetThunder minio instance as another data source using the keys you configured earlier:</p><pre><code>mc config host add myminio https://myminio.thunder16.xyz minioAdmin my_minio_secret
</code></pre><p>Finally, use the mirror command to migrate your data from S3 to Minio on NetThunder.</p><pre><code>$ mc mirror s3 myminio
.../test.png:  1.40 MiB / 1.40 MiB &#x2503;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2593;&#x2503; 1.72 MiB/s 0s
</code></pre><p>...and it&apos;s done! You have successfully migrated your S3 data to NetThunder!</p>]]></content:encoded></item><item><title><![CDATA[How to create a Web-to-Lead form in SuiteCRM]]></title><description><![CDATA[<p>Often times, when running a sales campaign, you will need to set up a web form that can send leads directly into your CRM system. Luckily for us, SuiteCRM makes this easy.</p><p>First, you need to have a working SuiteCRM installation. Our NetThunder platform provides an easy way to deploy</p>]]></description><link>https://blog.netthunder.com/how-to-create-a-web-to-lead-form-in-suitecrm/</link><guid isPermaLink="false">5ee18e05dfde1b0001c3e0bb</guid><dc:creator><![CDATA[Cameron Spry]]></dc:creator><pubDate>Mon, 10 Feb 2020 16:00:00 GMT</pubDate><content:encoded><![CDATA[<p>Often times, when running a sales campaign, you will need to set up a web form that can send leads directly into your CRM system. Luckily for us, SuiteCRM makes this easy.</p><p>First, you need to have a working SuiteCRM installation. Our NetThunder platform provides an easy way to deploy SuiteCRM with one-click, but this is core SuiteCRM functionality, so it should be present on all installations.</p><p>After you have SuiteCRM running, log in as a user with access to campaigns. Navigate to the campaigns selection under the &quot;Marketing&quot; tab.</p><figure class="kg-card kg-image-card"><img src="https://blog.netthunder.com/content/images/2020/02/part1.png" class="kg-image" alt loading="lazy"></figure><p>Then, click &quot;Create Person Form&quot; on the left-hand side of the page.</p><figure class="kg-card kg-image-card"><img src="https://blog.netthunder.com/content/images/2020/02/step2.png" class="kg-image" alt loading="lazy"></figure><p>A prompt will appear with three columns: &quot;Available Fields&quot;, &quot;First Form Column&quot;, and &quot;Second Form Column&quot;. This is to customize the HTML form that SuiteCRM is going to generate. Drag-and-drop the fields that you want to collect for your inbound leads, then press &quot;next&quot; to proceed.</p><figure class="kg-card kg-image-card"><img src="https://blog.netthunder.com/content/images/2020/02/step3.png" class="kg-image" alt loading="lazy"></figure><p>SuiteCRM will prompt you for more information about the form. Here you can customize the header, the description, the label, and the POST URL. Double-check the domain (and protocol) in the POST URL, as it may not be correct. Make sure it matches the URL of your SuiteCRM installation. If this is the case, check the &quot;Edit Post URL&quot; checkbox and update the URL to be correct. You will also need to select an associated campaign and user through the &quot;Select&quot; dialogs.</p><figure class="kg-card kg-image-card"><img src="https://blog.netthunder.com/content/images/2020/02/step4.png" class="kg-image" alt loading="lazy"></figure><figure class="kg-card kg-image-card"><img src="https://blog.netthunder.com/content/images/2020/02/step5.png" class="kg-image" alt loading="lazy"></figure><p>After choosing your campaign and proceeding onward, a form editor will appear. Here, you can further customize the appearance of the HTML form. Select &quot;Save Web Form&quot; when you are done.</p><figure class="kg-card kg-image-card"><img src="https://blog.netthunder.com/content/images/2020/02/step6form.png" class="kg-image" alt loading="lazy"></figure><p>On the final page of the form generator wizard, you can see the HTML/CSS/JS code that was generated. You can copy it all as-is, or just copy the &lt;form&gt; section and integrate it into your own website or app. Just remember to include the hidden campaign_id, assigned_user_id, and moduleDir fields that the wizard generates for you. Now you can receive leads directly into SuiteCRM from a web form! </p><figure class="kg-card kg-image-card"><img src="https://blog.netthunder.com/content/images/2020/02/step7.png" class="kg-image" alt loading="lazy"></figure>]]></content:encoded></item><item><title><![CDATA[Saying Goodbye to Windows Small Business Server 2011]]></title><description><![CDATA[<p>Microsoft support for Windows Server 2008 R2 and Small Business Server (SMBS) 2011 is set to end on January 14, 2020. When a desktop operating system reaches its end of life (EOL) it can be a big deal. But when a server operating system reaches its EOL that big deal</p>]]></description><link>https://blog.netthunder.com/saying-goodbye-to-windows-small-business-server-2011/</link><guid isPermaLink="false">5ee18e05dfde1b0001c3e0b9</guid><dc:creator><![CDATA[NetThunder]]></dc:creator><pubDate>Tue, 24 Dec 2019 00:27:08 GMT</pubDate><content:encoded><![CDATA[<p>Microsoft support for Windows Server 2008 R2 and Small Business Server (SMBS) 2011 is set to end on January 14, 2020. When a desktop operating system reaches its end of life (EOL) it can be a big deal. But when a server operating system reaches its EOL that big deal can become a huge IT project. New software may not run correctly on the old operating system. Security patches and updates are no longer provided, leaving servers and their networks vulnerable to security breaches.</p><p>Organizations in the healthcare industry will be in violation of HIPAA if their affected servers aren&apos;t updated by the deadline, and may be subject to fines and fees. Other regulated industries may also face similar compliance issues. As a result they may end up exposed to not only malicious actors, but regulatory sanctions as well.</p><p>Often businesses and IT departments choose to make infrastructure changes when a server&apos;s operating system reaches its EOL point. And that makes a lot of sense since server changes are a very large project. For several years the trend has been to move servers and services into the public cloud. But the public cloud is a prime target for hackers. And you have to be okay with your data sitting out there on a machine owned by someone else.</p><p>At NetThunder we believe there&apos;s a much better way. Our on-premise cloud solution smoothly replaces small business server services and operations. All while being more secure than public cloud solutions. And much faster to roll out than a traditional small business server.</p><p>As you begin the changeover from Server 2011, we invite you to explore the all of the benefits of NetThunder and our robust on-premise cloud solution.</p>]]></content:encoded></item><item><title><![CDATA[How to keep your data on premise]]></title><description><![CDATA[<p>These days there are so many &quot;cloud-based&quot; business applications. When an application is refered to as &quot;cloud-based&quot; that means it will be hosted on someone else&apos;s computer. There are many advantages to this especially in the SMB world because traditional IT (or on premise</p>]]></description><link>https://blog.netthunder.com/a-cloud-free-business/</link><guid isPermaLink="false">5ee18e05dfde1b0001c3e0ae</guid><dc:creator><![CDATA[Parker Schmitt]]></dc:creator><pubDate>Sun, 01 Dec 2019 11:29:00 GMT</pubDate><content:encoded><![CDATA[<p>These days there are so many &quot;cloud-based&quot; business applications. When an application is refered to as &quot;cloud-based&quot; that means it will be hosted on someone else&apos;s computer. There are many advantages to this especially in the SMB world because traditional IT (or on premise IT) is difficult to maintain and many companies lack the resources to set up new software applications for all their users. However, once a company starts using &quot;cloud-based&quot; applications they give up their privacy rights.</p><p>Many times companies, often unknowingly, will entrust their data to a third party through cloud-based services. Many times these cloud-based services become major targets for attackers (since if they are breached it&apos;s worth thousands of data-breaches to the attackers) or sometimes worse they monitize your data. Sometimes this is a fair exchange and some data is not private but it seems that, these days, many companies are stuck using &quot;cloud-based&quot; services as there are few alternatives and many of these companies lack the resources to implement solutions on premise.</p><p>Often times open source tools are hostable on premise however, as many business owners I have talked to have said, open source can be a blackhole of time; implementation takes time and every configuration seems to be different (that is until they switched to a NetThunder system which self configures these applications). &#xA0;Even with these costs hosting your own applications on open source software (even paid-open source) gives you an outstanding level of freedom and control. You control where your data sits on computers you can physically see and you are never locked in.</p><p>At NetThunder we designed our application marketplace for OneClickEnterprise to have a suite of applications to rid ourselves and our customers from all dependencies on the cloud or cloud based services. I have jokingly called us &quot;off the grid but still part of and connected to the modern world.&quot; (We aren&apos;t really off the grid but our data and our customers&apos; data is off the grid/cloud). </p><p>It is fun telling our customers that when they use our platform on premise we physically have no access to their data and we don&apos;t mind. We don&apos;t want their data and we don&apos;t need them to phone home.</p>]]></content:encoded></item></channel></rss>