Articles by 'Eric Corcoran'

Blog Author - Eric Corcoran

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/23 3 Easy Steps for End-to-End XDR with CrowdStrike and Zscaler (CrowdStrike) With the erosion of the corporate network perimeter and increased employee access to sensitive information from remote locations, corporate endpoints are left out in the wild and are often difficult to monitor for suspicious activity. http://bit.ly/3WsqIBz Fewer ransomware victims are paying up. But there's a catch Cyber criminals are finding it harder to make money from ransomware attacks. But that doesn't mean rans... read more.

  • January 27, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/16 2023 Trends: Disparities emerge in cybersecurity capabilities between private and public organizations (Cybersixgill) Come 2023, in the United States – there will be different experiences for the government versus companies, with the private sector on its own regarding the increasing number and ferocity of attacks – as they currently are. http://bit.ly/3GJNajR SRE Brings Modern Enterprise Architectures into Focus (F5) There’s more to assessing the performance and reliabili... read more.

  • January 20, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/9 Why Intelligent Privilege Controls Are Essential for Identity Security (CyberArk) Intelligent privilege controls must work in conjunction with one another to secure access for every identity. Continuous and constant monitoring and analysis of all activities of every identity allow organizations to detect and respond to unusual behavior. https://bit.ly/3WYBiS3 Learning From the Past — Ten 2022 Cybersecurity Events to Know (Palo Alto Networks) Threat actors are tremendously fond of recyc... read more.

  • January 16, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/19 Introducing Pure Storage FlashRecover//S, Powered by Cohesity (Pure Storage) Jointly architected by Pure Storage and Cohesity, FlashRecover//S is designed to deliver a powerful yet easy-to-use solution with multiple levels of built-in ransomware protection. https://bit.ly/3HMXYjb 2023 Cybersecurity Trends We’re Tracking (CyberArk) Cybersecurity doesn’t happen in a vacuum. Evolving attack trends, world events, regulatory changes, shifting organizational priorities and many other... read more.

  • January 06, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/12   Client-Side Defense: The Missing Piece in Your Holiday Security Armor (F5) Without visibility into the code that runs in your environment, companies cannot detect when code has changed or been compromised. These scripts provide threat actors a wide attack surface to exploit, allowing security incidents to occur directly in the customer’s browser without the user or merchant realizing it. https://bit.ly/3iWkbBa Pure Storage CEO: ‘The Days Of The Hard Disk In The Data Cent... read more.

  • December 16, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/5 Cloud Migration On Your Identity Security Terms (CyberArk) Companies of all sizes continue flocking to the cloud for its many business benefits: Reduced infrastructure costs, increased flexibility and more dynamic application development, to name a few. https://bit.ly/3Y1ydBp Citrix DaaS is now available on AWS Marketplace! (Citrix) Citrix and AWS are making it easier than ever to leverage joint solutions. With Citrix DaaS on AWS, customers can purchase, deploy, and manage their desktop dep... read more.

  • December 09, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/21 Prisma Cloud to Secure Supply Chain with Proposed Acquisition of Cider (Palo Alto Networks) The diversity, velocity and dynamic nature of today’s engineering ecosystem have introduced a wide array of new security challenges and gaps, setting the stage for the software supply chain to emerge as one of the most challenging and impactful attack vectors of the past few years. http://bit.ly/3Axbkfk A Comprehensive Look at Emotet’s Fall 2022 Return (Proofpoint) Emotet returned to the... read more.

  • December 05, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/14 Identity Security Calls for Leadership Across Categories (CyberArk) 52% of all employee identities have access to sensitive systems and data that attackers can easily exploit. In this environment, every identity at any access point is a gateway to an organization’s most valuable resources. http://bit.ly/3hBTgKe 5 Ransomware Protection Strategies for 2023 (Fortinet) In just the first half of 2022, the number of new ransomware variants we identified increased by nearly 100% compared to... read more.

  • November 18, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/7 CISA’s New Directive BOD 23-01: The First Step in Building an Efficient Cybersecurity Posture (Cybersixgill) Although BOD 23-01 is mandatory only for FCEB agencies, CISA recommends that all organizations review this directive and adopt its guidance to strengthen asset management and vulnerability detection practices within their networks - and enhance their organization's cyber resilience. https://bit.ly/3FToQwZ Fortinet Named a Leader in the 2022 Forrester Wave™ for Enterprise F... read more.

  • November 11, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/31 Citrix Cloud Connectors: How they work and how to get the most from them (Citrix) Cloud Connectors unlock the advantages of cloud management by bridging on-prem and cloud deployments, without requiring complex networking or infrastructure configuration. https://bit.ly/3FvOzLO Cyber Threats Happen — Prevention, Protection and Recovery Tips (Palo Alto Networks) While there’s no way to predict a bad actor’s next move, we do know that people are the first line of defense, and... read more.

  • November 04, 2022