Articles by 'Eric Corcoran'

Blog Author - Eric Corcoran

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/17 VMware's Purple Screen of Death Similar to Microsoft’s Blue Screen of Death, the Purple Screen of Death occurs when there is a kernel panic in Linux variants that result in a system halt. This typically is due to a driver issue, hardware issue, or in my case, a recent patch. https://www.gothamtg.com/blog/vmwares-purple-screen-of-death Log4j Vulnerability: Are Organizations Still at Risk? (F5) It’s been almost 2 years since the log4j vulnerability was exposed, and organizations a... read more.

  • July 21, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/10   June 2023’s Most Wanted Malware: Qbot Most Prevalent Malware in First Half of 2023 and Mobile Trojan SpinOk Makes its Debut (Check Point) Our latest Global Threat Index for June 2023 saw researchers report that Trojan Qbot has been the most prevalent malware so far in 2023, ranking first in five out of the six months to date. https://bit.ly/3NNCQef Zero Trust: The Key to a Hybrid Workforce (Palo Alto Networks) Helping the workforce adapt to a work-from-home lifestyle doesn&rsq... read more.

  • July 14, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/26 Key Takeaways from the State of Zero Trust Report (Fortinet) In April, Fortinet commissioned a survey of 570 IT and security leaders from 31 different countries, covering nearly all industries, including the public sector. The resulting 2023 State of Zero Trust Report provides insight into the progress IT teams are making in implementing their zero-trust strategies. https://bit.ly/3CLKGQj Think Your Secrets are Safe in their Vault? Think Again (Check Point) As organizations grow and develop... read more.

  • July 07, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/19 Preventing Cyber Attacks is Critical to Improve Healthcare Outcomes (Check Point) Last month, 1 out of every 44 organizations across the United States were impacted by ransomware attacks. Healthcare organizations continue to be among the top 3 most impacted industries. https://bit.ly/3Pkm4pn Six Critical Vulnerabilities Patched with Microsoft’s June Security Update (Arctic Wolf) On June 13, 2023, Microsoft published their June 2023 Security Update which included patches for six vulner... read more.

  • June 23, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/12 Fortinet Converges NGFW and SD-WAN to Protect Traffic Traversing the Entire Azure vWAN Environment (Fortinet) Azure vWAN is a cloud service that brings together networking, security, and routing under a single operational interface, and customers typically use it to provide connectivity between their on-premises data centers, branch offices, and Azure vWANs. https://bit.ly/3p2h1z2 Tuesday 6/13 F5 Published Cybersecurity Research: Performance and Effectiveness on ML/AI Frameworks (F5) Organ... read more.

  • June 19, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/5 What Physical NICs Are Your VMs Using? https://www.gothamtg.com/blog/what-physical-nics-are-your-vms-using Non-disruptive Workload Mobility with ActiveWorkload (Pure Storage) ActiveWorkload is a powerful tool that enables you to move workloads non-disruptively between FlashArray systems. https://bit.ly/43JYtTc Extending Zero Trust OT Security to Meet Air Gap Requirements (Palo Alto Networks) These offerings were designed to help organizations stay secure while adapting to the tremendous am... read more.

  • June 09, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/22 The Evolving Landscape of Distributed Application Security: Beyond Network Firewalls (F5) With the dispersion of application services across highly distributed environments, security has become an infinitely more complex endeavor. https://bit.ly/3MNtaRB The Seven Types of Non-human Identities to Secure (CyberArk) Being aware of all the different identity types in your organization and understanding all the different security needs that must be considered are the first steps to building a co... read more.

  • June 02, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/15 The Value of Holistic Visibility: Putting it All Together (Arctic Wolf) Organizations have too many tools feeding them more information than their staff can handle, and partially because those tools are siloed off and improperly managed, preventing comprehensive information and complete understanding of what’s happening within an organization’s IT infrastructure. https://bit.ly/44VGWsB Ransomware Roundup – Maori (Fortinet) FortiGuard Labs recently came across a new ransomw... read more.

  • May 19, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/8 The Importance of Identity and Access Management (Arctic Wolf) Proper IAM management is a discipline that involves people, processes, and technologies, and is an ongoing journey that follows what is referred to as the access management lifecycle. https://bit.ly/3M6jZLI Cyber as a Shared Responsibility; How Rubrik and Zscaler Stepped Forward (Rubrik) Over the past few years as ransomware and other threats have increased, private sector companies have embarked on aggressive journeys to reduce... read more.

  • May 12, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/1 Why Ransomware and Business Email Compromise Remain Top Attack Types (Arctic Wolf) The continued increase in cybercrime and breach attempts is not a new trend. For years now, the percentages have ticked upwards, and though cybersecurity has evolved, so have hackers seeking data, money, or infamy. https://bit.ly/3VjwGpm AI Powers the Branch of the Future, Today (Palo Alto Networks) With the establishment of hybrid work as a long-term trend and the exponential increase in cloud usage, organiza... read more.

  • May 05, 2023