Articles by 'Eric Corcoran'

Blog Author - Eric Corcoran

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/17 A New Era of Email Security: Easier—and Even More Effective (Proofpoint) Email is the number one threat vector and a massive risk vector for breaches today, which is why it's crucial for organizations to have an effective, integrated set of controls to stop phishing attacks and other email-related threats. https://bit.ly/3eFHhdx Why Strong Passwords Alone Won’t Stop Identity-Based Attacks (CyberArk) No matter how strong your organization’s password policies and awareness... read more.

  • October 21, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/10 You’ve Enabled MFA — Great! This Cybersecurity Awareness Month, Focus on How and Where It’s Used (CyberArk) Thanks to repeated front-page news coverage, MFA fatigue attacks are likely high on your radar. For these, threat actors employ various digital and voice-based phishing techniques to steal credentials and then send repeated MFA push requests to a target’s mobile device to successfully dupe employees and third-party vendors. https://bit.ly/3CIRQWi Ransomware-as-... read more.

  • October 14, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/3 Q&A on Cyber Resiliency for Operational Technology (Fortinet) Fortinet’s CISO for Operational Technology, Willi Nelson, shares perspective on considerations when developing cyber resilience, covering fundamentals and strategic planning, to protect the convergence of IT and OT environments. https://bit.ly/3e2oEAe Hackers are testing a destructive new way to make ransomware attacks more effective Ransomware hackers are experimenting with a new kind of attack that, instead of encrypt... read more.

  • October 07, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/26 Benefits of an Insider Threat Management Program (Proofpoint) The success of an ITM program is completely dependent upon involving stakeholders beyond IT and information security. Since anyone in your organization could become a source of insider challenges, you need representation from all parts of your organization. https://bit.ly/3Rg23Ob Prevention-first MDR/MPR – Elevating Managed Detection and Response to the Next Level (Check Point) Check Point’s Mid-Year Report recently r... read more.

  • September 30, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/19 Strengthening Your Defenses Against Cloud Threats with Proofpoint and CrowdStrike (Proofpoint) In this changing environment, enterprises must take a people-centric approach to cloud security and protecting their data – so users can securely access the web, cloud services, and private apps. https://bit.ly/3UfefS1 Fortinet Collaborates with AWS to Deliver Low Cost, High Performance NGFW Protection on AWS Graviton Instances (Fortinet) This new capability provides Fortinet customers with... read more.

  • September 23, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/12 Modernizing IT Starts with Infrastructure (F5) Modernizing infrastructure requires attention to its ability to support the tools and technologies in use to orchestrate the processes that carry out changes. https://bit.ly/3qwAaX2 Consolidated Identity Protection in a Unified Security Platform Is a Must-Have for the Modern SOC (CrowdStrike) The right way to address these challenges is a unified platform approach that seamlessly integrates telemetry from across customer endpoints, workloads, i... read more.

  • September 16, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/22 Citrix Features Explained: Improving end-user security with Citrix Secure Private Access (Citrix) Citrix Secure Private Access was created to balance security and user experience, delivering robust, adaptive, and VPN-less security without interfering with the preferred workflows of hybrid employees. https://bit.ly/3R2tRWA Escaping Ransomware Jail: Protection Before, During, and After an Attack (Pure Storage) Ransomware isn’t going away anytime soon. It’s “not if but when.&... read more.

  • September 02, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/15 CrowdStrike and Industry Partners Release Open Cybersecurity Schema Framework (CrowdStrike) The OCSF is an open source effort among industry leaders to break down the data silos that hamper security teams’ efforts to detect, investigate and stop cyberattacks https://bit.ly/3JS8BjX Extend Proofpoint DLP to Third Parties with ICAP (Proofpoint) With data expected to grow at 23% annually, automation and consolidation of security operations is essential if security teams are to keep up. Pr... read more.

  • August 19, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/8 Behavioral Analysis and AI/ML for Threat Detection: Going Behind the Scenes on the Newest Detection Engine from Proofpoint (Proofpoint) The new Supernova Behavioral Engine improves our already leading efficacy, while ensuring low false positives for customers. We’re also committed to transparency, especially given how much vendor noise there is around the use of AI/ML. https://bit.ly/3QbYRmU What Is SQL Injection? Identification & Prevention Tips (Varonis) Applications tend to be a... read more.

  • August 12, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/25 New Global OT and Cybersecurity Report Outlines Key Challenges for Industrial Organizations (Fortinet) Besides providing the latest statistics on the state of OT cybersecurity, the 2022 State of Operational Technology and Cybersecurity Report offers insights on how best to handle OT vulnerabilities and how best to strengthen an organization’s overall security posture. https://bit.ly/3cIPwUZ LinkedIn Still Number One Brand to be Faked in Phishing Attempts while Microsoft Surges up the R... read more.

  • August 05, 2022