Articles by 'Eric Corcoran'

Blog Author - Eric Corcoran

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/12   Client-Side Defense: The Missing Piece in Your Holiday Security Armor (F5) Without visibility into the code that runs in your environment, companies cannot detect when code has changed or been compromised. These scripts provide threat actors a wide attack surface to exploit, allowing security incidents to occur directly in the customer’s browser without the user or merchant realizing it. https://bit.ly/3iWkbBa Pure Storage CEO: ‘The Days Of The Hard Disk In The Data Cent... read more.

  • December 16, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/5 Cloud Migration On Your Identity Security Terms (CyberArk) Companies of all sizes continue flocking to the cloud for its many business benefits: Reduced infrastructure costs, increased flexibility and more dynamic application development, to name a few. https://bit.ly/3Y1ydBp Citrix DaaS is now available on AWS Marketplace! (Citrix) Citrix and AWS are making it easier than ever to leverage joint solutions. With Citrix DaaS on AWS, customers can purchase, deploy, and manage their desktop dep... read more.

  • December 09, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/21 Prisma Cloud to Secure Supply Chain with Proposed Acquisition of Cider (Palo Alto Networks) The diversity, velocity and dynamic nature of today’s engineering ecosystem have introduced a wide array of new security challenges and gaps, setting the stage for the software supply chain to emerge as one of the most challenging and impactful attack vectors of the past few years. http://bit.ly/3Axbkfk A Comprehensive Look at Emotet’s Fall 2022 Return (Proofpoint) Emotet returned to the... read more.

  • December 05, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/14 Identity Security Calls for Leadership Across Categories (CyberArk) 52% of all employee identities have access to sensitive systems and data that attackers can easily exploit. In this environment, every identity at any access point is a gateway to an organization’s most valuable resources. http://bit.ly/3hBTgKe 5 Ransomware Protection Strategies for 2023 (Fortinet) In just the first half of 2022, the number of new ransomware variants we identified increased by nearly 100% compared to... read more.

  • November 18, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/7 CISA’s New Directive BOD 23-01: The First Step in Building an Efficient Cybersecurity Posture (Cybersixgill) Although BOD 23-01 is mandatory only for FCEB agencies, CISA recommends that all organizations review this directive and adopt its guidance to strengthen asset management and vulnerability detection practices within their networks - and enhance their organization's cyber resilience. https://bit.ly/3FToQwZ Fortinet Named a Leader in the 2022 Forrester Wave™ for Enterprise F... read more.

  • November 11, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/31 Citrix Cloud Connectors: How they work and how to get the most from them (Citrix) Cloud Connectors unlock the advantages of cloud management by bridging on-prem and cloud deployments, without requiring complex networking or infrastructure configuration. https://bit.ly/3FvOzLO Cyber Threats Happen — Prevention, Protection and Recovery Tips (Palo Alto Networks) While there’s no way to predict a bad actor’s next move, we do know that people are the first line of defense, and... read more.

  • November 04, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/24 Recognizing, Reporting, and Preventing Phishing (Fortinet) What’s especially concerning as we look back at the first half of 2022 is that the number of new ransomware variants we identified increased by nearly 100% compared to the previous six-month period. https://bit.ly/3z92nI2 Passwords still dominate, and are causing headaches for everyone Password-spraying attacks relying on lists of millions of passwords leaked in the past decade, are on the rise, making MFA one of the most eff... read more.

  • October 28, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/17 A New Era of Email Security: Easier—and Even More Effective (Proofpoint) Email is the number one threat vector and a massive risk vector for breaches today, which is why it's crucial for organizations to have an effective, integrated set of controls to stop phishing attacks and other email-related threats. https://bit.ly/3eFHhdx Why Strong Passwords Alone Won’t Stop Identity-Based Attacks (CyberArk) No matter how strong your organization’s password policies and awareness... read more.

  • October 21, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/10 You’ve Enabled MFA — Great! This Cybersecurity Awareness Month, Focus on How and Where It’s Used (CyberArk) Thanks to repeated front-page news coverage, MFA fatigue attacks are likely high on your radar. For these, threat actors employ various digital and voice-based phishing techniques to steal credentials and then send repeated MFA push requests to a target’s mobile device to successfully dupe employees and third-party vendors. https://bit.ly/3CIRQWi Ransomware-as-... read more.

  • October 14, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/3 Q&A on Cyber Resiliency for Operational Technology (Fortinet) Fortinet’s CISO for Operational Technology, Willi Nelson, shares perspective on considerations when developing cyber resilience, covering fundamentals and strategic planning, to protect the convergence of IT and OT environments. https://bit.ly/3e2oEAe Hackers are testing a destructive new way to make ransomware attacks more effective Ransomware hackers are experimenting with a new kind of attack that, instead of encrypt... read more.

  • October 07, 2022