Articles by 'Eric Corcoran'

Blog Author - Eric Corcoran

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/22 We're proud to have supported @AOfrockland this past Saturday during their walk around Rockland Lake. We are proud to sponsor The Arc of Rockland and support the individuals and families they serve. Click the link to learn more about The Arc of Rockland: https://arcofrockland.org/ 5 Threat Intelligence Solution Use Cases (Recorded Future) Cyber threats are becoming increasingly sophisticated and frequent, making it imperative for organizations to leverage cyber threat intelligence to stay a... read more.

  • July 26, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/15 Cybersecurity Stop of the Month: Reeling in DarkGate Malware Attacks from the Beach (Proofpoint) In a recent attack, a threat actor (TA571) used DarkGate to try to infiltrate over 1,000 organizations worldwide. The attack spanned across 14,000 campaigns and contained more than 1,300 different malware variants. https://www.proofpoint.com/us/blog/email-and-cloud-threats/darkgate-malware Tuesday 7/16 Preventing Unintentional Data Exposure ft. Bryon Singh, RailWorks Corporation https://www.got... read more.

  • July 19, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/8 The Growing Dichotomy of AI-Powered Code in Cloud-Native Security (Palo Alto Networks) Amidst the allure of newfound technology lies a profound duality – the stark contrast between the benefits of AI-driven software development and the formidable security risks it introduces. https://www.paloaltonetworks.com/blog/2024/07/the-growing-dichotomy-of-ai-powered-code-in-cloud-native-security/ Tuesday 7/9 You Cannot Pass ft. Bryon Singh, RailWorks Corporation https://www.gothamtg.com/blog/yo... read more.

  • July 12, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/1 Seeing the Unseen: Preventing Breaches by Spotting Malicious Browser Extensions (CrowdStrike) When an end user installs a browser extension, the permissions granted open the door to a world of possibilities — and vulnerabilities. Depending on what’s allowed, these extensions can access a veritable treasure trove of information. https://www.crowdstrike.com/blog/prevent-breaches-by-stopping-malicious-browser-extensions/ DMARC: Why It's Moving from a Best Practice to a Must-Have (Pro... read more.

  • July 05, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/17 5 Things to Do First During a Ransomware Attack (Pure Storage) Knowing the challenges you’ll face first and the immediate steps you can take during the early stages of an attack can help minimize loss, cost, and risk. https://blog.purestorage.com/perspectives/a-6-point-plan-for-the-during-of-a-data-breach/ Triage Your Cloud Security: Risk Prioritization Methods (CyberArk) Effective risk prioritization requires a nuanced understanding of risk dynamics and a strategic, adaptive approach... read more.

  • June 28, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/10 Announcing the inclusion of XenServer 8 in all new Citrix subscriptions! (Citrix) XenServer provides our Citrix platform customers the premium hypervisor capabilities optimized for Citrix workloads. Leveraging XenServer for your Citrix workloads helps you save money on 3rd party hypervisor solutions, while getting the most out of your Citrix deployment, with optimizations for Citrix only available from XenServer, such as PVS Accelerator, Intellicache, and MCS Read Cache. https://www.citrix.co... read more.

  • June 14, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/3 Major Botnets Disrupted via Global Law Enforcement Takedown (Proofpoint) Per Europol, in conjunction with the malware disruption, the coordinated action led to four arrests, over 100 servers taken down across 10 countries, over 2,000 domains brought under the control of law enforcement, and illegal assets frozen. https://www.proofpoint.com/us/blog/threat-insight/major-botnets-disrupted-global-law-enforcement-takedown Tuesday 6/4 Endpoint Management Upleveled: New device list functionality (C... read more.

  • June 11, 2024

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 5/28 Creating a Security Program with Less Complexity and More Visibility (Palo Alto Networks) The greatest misconception about cybersecurity is that programs can catch up overnight with silver-bullet solutions. There’s no substitute for a strong foundation and daily maintenance. https://www.paloaltonetworks.com/blog/2024/05/creating-a-security-program/ AI and Automation in the Race to Reduce Attack Dwell Time (Check Point) As cyber threats continue to evolve, so too must the strategies a... read more.

  • May 31, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/13 CrowdStrike Enhances Cloud Asset Visualization to Accelerate Risk Prioritization (CrowdStrike) The massive increase in cloud adoption has driven adversaries to focus their efforts on cloud environments — a shift that led to cloud intrusions increasing by 75% in 2023, emphasizing the need for stronger cloud security. https://www.crowdstrike.com/blog/enhanced-cloud-asset-visualization/ CISA opens its malware analysis and threat hunting tool for public use (CSO Online) https://www.csoonl... read more.

  • May 24, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/6 Prisma SASE 3.0 — Securing Work Where It Happens (Palo Alto Networks) This unrestricted approach empowers users, but it also increases risk due to a lack of consistent security, control and visibility across devices. Security strategies must catch up, and Palo Alto Networks is once again leading that charge. https://www.paloaltonetworks.com/blog/2024/05/prisma-sase-3-0/ Understanding Risk-Based Vulnerability Management (Arctic Wolf) For all the concern about phishing, insider threats,... read more.

  • May 10, 2024