By Eric Corcoran, Posted in Technology Week in Review

Monday 7/25 New Global OT and Cybersecurity Report Outlines Key Challenges for Industrial Organizations (Fortinet) Besides providing the latest statistics on the state of OT cybersecurity, the 2022 State of Operational Technology and Cybersecurity Report offers insights on how best to handle OT vulnerabilities and how best to strengthen an organization’s overall security posture. LinkedIn Still Number One Brand to be Faked in Phishing Attempts while Microsoft Surges up the R... read more.

  • August 05, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/11 Wide Open Outbound Firewall Policy – Part 2 A loose outbound Internet policy may only become visible after a firm is affected by a ransomware event. Until then, it is too easy for firewall administrators to overlook the weakness of the loose outbound Internet policy. Data Privacy Requires Protection against Credential Stuffing (F5) Credential stuffing is a cybercrime whereby criminals test stolen credentials against websites in order to take over accounts. Crimi... read more.

  • July 25, 2022

By Michael Hawkins, Posted in Infrastructure, Security

In Part 1 of this series, we began talking about best practices for firewall policy rules that are applied to outbound access to the Internet. In Part 2, we’ll briefly discuss the human element and then circle back to actual policy prescriptions.  Effort vs Risk – The Human Element The firewall administrator is the person (or team) responsible for maintaining a secure firewall policy including the “outbound to Internet” rules. Sometimes the firewall admin role falls to a less... read more.

  • July 11, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/27 The Importance of a Consistent Security Policy (Palo Alto Networks) Building upon industry-leading security technologies in conjunction with strong technology partnerships, Palo Alto Networks can help you consolidate your approach to security while maintaining crucial IT business continuity. What is an Insider Threat? Definition and Examples (Varonis) The individual doesn’t need to be an employee, and the harm may not even be deliberate, but insider threats are... read more.

  • July 08, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/20 ICYMI: Ken Phelan, was joined by Gotham’s EUC & Cloud Practice Director, Brian Wagner, and Rubrik, Inc.’s Christopher Culver and Drew Russell for a discussion surrounding Modern Resiliency. Make device management simpler with Citrix Provisioning Services (Citrix) Citrix has made many optimizations and tweaks throughout the years to ensure that PVS performs at its best from the perspective of device check-ins, failover times, and sca... read more.

  • June 24, 2022

By Timothy Karl, Posted in Virtualization

Citrix Virtual Apps and Desktops 7.15 LTSR will reach End of Life (EOL) on August 15, 2022. Customers using this version who wish to remain on the LTSR track must upgrade to 1912 or 2203 LTSR before then or risk being on an unsupported platform. Besides supportability, there are additional benefits for upgrading to 1912 and 2203 LTSR. Additional OS Support for Infrastructure components and VDAs 7.15 LTSR supports up to Windows 10 for Desktop OS and Windows 2016 Server OS. Both 1912 and 2203 LTSR allow you... read more.

  • June 22, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/13 A True Converged Platform Starts with a Powerful Network Firewall (Fortinet) In these new hybrid network environments, security cannot function as a standalone solution. Instead, security must be seamlessly converged with the underlying network, enabling protections to dynamically adapt to a constantly shifting network. Paying Ransomware Paints Bigger Bullseye on Target’s Back Paying ransomware attackers doesn’t pay off and often paints a bigger target on... read more.

  • June 17, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/6 Brute-Force Attacks: How to Defend Against Them (Arctic Wolf) When you hear the words “brute force," subtlety is probably not the first thing that comes to mind. Indeed, classic brute-force cyber attacks use the most straightforward tactics—trial and error—to gain entry into a protected system. State of Application Strategy 2022: Security Shifts to Identity (F5) But it’s not just that identity and access have risen to become the most deployed te... read more.

  • June 10, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/23 2022 Cloud Security Report (Fortinet) The 2022 Cloud Security Report reveals how security executives and practitioners are using the cloud, how their organizations are responding to security threats in the cloud, and the challenges they are facing. Let’s look at some of the highlights from this year’s report. ABAC vs. RBAC: What’s the Difference? (Citrix) These types of access control models determine authorization based on who the user is and what r... read more.

  • June 03, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/16 The Move to Modernize Ops Will Increase the Need for Software Supply Chain Security (F5) The one thing we’ve learned from DevOps that you cannot ignore as you modernize ops is that SRE practices will incur much of the same technical debt and security challenges. Cybersecurity 101: Basic Terminology You Need to Know (Arctic Wolf) The constantly changing world of cybersecurity can leave you longing for an understanding of today's modern threats. A solid foundation... read more.

  • May 23, 2022