Articles by 'Eric Corcoran'

Blog Author - Eric Corcoran

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/13 Actionable Insights: Increasing Your Organization’s “Risk Efficacy” Through Targeted Controls (Proofpoint) Using actionable insights to assess your cybersecurity measures is key to protecting against potential threats. http://bit.ly/3JxZw1a CISA: Do these three things to toughen up your network against hackers (ZDNet) Cybersecurity agency shares the lessons learned from a red team assessment of a critical infrastructure organization. http://bit.ly/42bWoiW Tuesday 3/14 D... read more.

  • March 17, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/6 FlashBlade//E™: The Dawn of a New //Era for Unstructured Data Storage (Pure Storage) Pure Storage FlashBlade//E delivers the environmental, ease of use, and reliability benefits of all-flash storage for unstructured data workloads, but at a cost competitive to disk-based storage solutions. http://bit.ly/3EVh1FZ Just Because It’s Old Doesn’t Mean You Throw It Away (Including Malware!) (Fortinet) MyDoom (also known as Novarg and Mimail) was first discovered back in 2004. And... read more.

  • March 10, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/27 Security, Productivity and Privacy: Balancing a 3-Legged Stool (Proofpoint) Securing sensitive information can’t be a one-size-fits-all approach because each organization’s definition of sensitive information can be different. http://bit.ly/41ti89u HardBit 2.0 Ransomware (Varonis) Like most modern ransomware threats, HardBit claims to steal sensitive data from their victims, likely upon first gaining access to the network, before launching their payload to encrypt data. http://... read more.

  • March 03, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/20 3 Ways Visualization Improves Cloud Asset Management and Security (CrowdStrike) While it’s important to understand the relationships and potential vulnerabilities of your cloud assets, the practice of managing these systems is complicated by the ever-changing nature of cloud environments. http://bit.ly/417Bwsr Ransomware Roundup – CatB Ransomware (Fortinet) CatB is a reasonably new entrant to the ransomware field, with samples only dating back to December 2022. The ransom demand... read more.

  • February 24, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/13   Make Compliance a Breeze with Modern Log Management (CrowdStrike) While regulations vary by country and industry, nearly every organization must store compliance-relevant information for a certain period of time. The trouble comes when you’ve got an assortment of tools emitting logs in an inconsistent fashion. http://bit.ly/3DY9Tbm Machine Creation Services support for catalogs with Azure VM extensions (Citrix) Adding Azure VM extensions to your machine catalogs is a powerful... read more.

  • February 17, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/6 CrowdStrike Announces Expanded Service Integrations with AWS (CrowdStrike) On January 31, 2023, AWS announced CloudTrail Lake Partner Integrations, with CrowdStrike signing on as a launch partner. With this integration, organizations get the opportunity for a consistent security posture between on-premises workloads and those running in the AWS cloud. http://bit.ly/3jwQeYY Ransomware Roundup – Trigona Ransomware (Fortinet) The Ransomware Roundup report aims to provide readers with brie... read more.

  • February 10, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/30 Why Small Businesses Choose CrowdStrike (CrowdStrike) A cyberattack can cause significant damage to any organization. But for SMBs, a security incident that causes productivity loss, financial trouble or reputation harm can be devastating. https://bit.ly/3DpxJMM Introducing Automated Posture Management: Fix Cloud Security Risks with One-Click (Varonis) With how quickly SaaS and IaaS apps add new features and functionality, it can be difficult to make sure they’re always configured pro... read more.

  • February 03, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/23 3 Easy Steps for End-to-End XDR with CrowdStrike and Zscaler (CrowdStrike) With the erosion of the corporate network perimeter and increased employee access to sensitive information from remote locations, corporate endpoints are left out in the wild and are often difficult to monitor for suspicious activity. http://bit.ly/3WsqIBz Fewer ransomware victims are paying up. But there's a catch Cyber criminals are finding it harder to make money from ransomware attacks. But that doesn't mean rans... read more.

  • January 27, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/16 2023 Trends: Disparities emerge in cybersecurity capabilities between private and public organizations (Cybersixgill) Come 2023, in the United States – there will be different experiences for the government versus companies, with the private sector on its own regarding the increasing number and ferocity of attacks – as they currently are. http://bit.ly/3GJNajR SRE Brings Modern Enterprise Architectures into Focus (F5) There’s more to assessing the performance and reliabili... read more.

  • January 20, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/9 Why Intelligent Privilege Controls Are Essential for Identity Security (CyberArk) Intelligent privilege controls must work in conjunction with one another to secure access for every identity. Continuous and constant monitoring and analysis of all activities of every identity allow organizations to detect and respond to unusual behavior. https://bit.ly/3WYBiS3 Learning From the Past — Ten 2022 Cybersecurity Events to Know (Palo Alto Networks) Threat actors are tremendously fond of recyc... read more.

  • January 16, 2023