Articles by 'Eric Corcoran'

Blog Author - Eric Corcoran

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/3 6 building blocks of a winning identity security strategy (Delinea) Identity strategy is not just about ensuring humans and non-humans have the right access; it's also about enhancing the security mechanisms that protect sensitive information from unauthorized access and breaches. https://delinea.com/blog/6-building-blocks-of-a-winning-identity-security-strategy Tuesday 2/4 Staying Ahead: Proactive Cybersecurity in the Era of Evolving Threats (Adlumin) By leveraging advancements in artifici... read more.

  • February 07, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/27 The anatomy of a Toxic Combination of Risk (Wiz) In cloud security, the key to proactively managing your attack surface is understanding how different risk factors combine to create attack paths that would lead to significant business impact. In this blog, we’ll explore how cloud security solutions can uncover these "toxic combinations" of risk and why certain tools are better equipped to do so. https://www.wiz.io/blog/the-anatomy-of-a-toxic-combination-of-risk Staying Ahead: Proactive... read more.

  • January 31, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/20 CIS Safeguard 2.5: Allowlist Authorized Software https://www.gothamtg.com/blog/cis-safeguard-25-allowlist-authorized-software Balancing the cost and complexity of investing in your identity security strategy (Delinea) For organizations of all sizes, investing in a robust identity security strategy is crucial. The move towards platformization and smart consolidation offers a streamlined path forward, enabling businesses to manage complexities more effectively while aligning with enterprise pr... read more.

  • January 24, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/13 Understanding Indicators of Compromise and Their Role in Cybersecurity (Arctic Wolf) Indicators of Compromise continue to evolve and change as they are directly related to the constantly evolving nature of threats: malware strains appear and disappear, the expanding attack surface reveals new targets for exploit, and threat actors continue to shift their signatures in attempts to avoid detection. https://arcticwolf.com/resources/blog/understanding-indicators-of-compromise-and-their-role-in-cy... read more.

  • January 17, 2025

By Eric Corcoran, Posted in Technology Week in Review

Thursday 1/2 How SASE Addresses Enterprise Network Challenges (Check Point) Organizations implementing SASE have reported improved operational efficiency, with streamlined management and reduced complexity leading to better resource allocation and faster response times to security incidents. https://blog.checkpoint.com/harmony-sase/how-sase-addresses-enterprise-network-challenges/ Citrix Secure Private Access delivers ZTNA in hybrid mode (Citrix) Implementing ZTNA organization-wide is not a trivial und... read more.

  • January 10, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/16 8 Trends Reshaping Network Security in 2025 (Palo Alto Networks) The future of network security is an exciting one, but it also comes with its challenges. As 2025 approaches, it’s critical for organizations to stay ahead of these emerging trends by building agile security strategies that are adaptable to the rapidly changing threat landscape. https://www.paloaltonetworks.com/blog/2024/12/8-trends-network-security-in-2025/ How integrated, intelligent identity security makes you more pr... read more.

  • December 20, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/9 Windows 365 Link: A New Era for Thin Client Computing Unveiled at Ignite 2024 Microsoft unveiled the Windows 365 Link at its Ignite conference on November 19, 2024. This compact, fanless device is designed to provide seamless access to Windows 365 Cloud PCs, building upon the legacy of Windows CE, Microsoft's early thin client operating system. https://www.gothamtg.com/blog/windows-365-link-a-new-era-for-thin-client-computing-unveiled-at-ignite-2024 How to Overcome MFA Challenges for Stronge... read more.

  • December 13, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/2 Why Data Infrastructure Is the Bedrock of AI’s Success (Pure Storage) AI can be a resource-intensive and power-hungry endeavor. A high-performance storage platform that offers seamless data accessibility, scalability, and energy and cost efficiency will be essential to meet the demands of AI today and into the future. https://blog.purestorage.com/perspectives/why-data-infrastructure-is-the-bedrock-of-ais-success/ What is bring your own device (BYOD)? (Nerdio) As remote and hybrid work... read more.

  • December 06, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/11 October 2024’s Most Wanted Malware: Infostealers Surge as Cyber Criminals Leverage Innovative Attack Vectors (Check Point) Check Point’s Global Threat Index for October 2024 reveals a concerning trend in the cyber security landscape: the rise of infostealers and the increasing sophistication of attack methods employed by cyber criminals. https://blog.checkpoint.com/security/october-2024s-most-wanted-malware-infostealers-surge-as-cyber-criminals-leverage-innovative-attack-vectors/... read more.

  • November 15, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/4 How to Enroll an iOS 18 Device in Intune Older versions of iOS continue to support the older enrollment method and the device can be successfully upgraded to iOS 18. However, if the user unenrolls the device, re-enrollment will need to be done with the newer enrollment method. https://www.gothamtg.com/blog/ios-18-mobile-device-management-enrollment Why SIEM Is Not Right for SaaS Security (Arctic Wolf) Automating data collection, aggregation, and analysis from all the security tools sounds l... read more.

  • November 08, 2024