Articles by 'Eric Corcoran'

Blog Author - Eric Corcoran

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/12 Fortinet Converges NGFW and SD-WAN to Protect Traffic Traversing the Entire Azure vWAN Environment (Fortinet) Azure vWAN is a cloud service that brings together networking, security, and routing under a single operational interface, and customers typically use it to provide connectivity between their on-premises data centers, branch offices, and Azure vWANs. https://bit.ly/3p2h1z2 Tuesday 6/13 F5 Published Cybersecurity Research: Performance and Effectiveness on ML/AI Frameworks (F5) Organ... read more.

  • June 19, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/5 What Physical NICs Are Your VMs Using? https://www.gothamtg.com/blog/what-physical-nics-are-your-vms-using Non-disruptive Workload Mobility with ActiveWorkload (Pure Storage) ActiveWorkload is a powerful tool that enables you to move workloads non-disruptively between FlashArray systems. https://bit.ly/43JYtTc Extending Zero Trust OT Security to Meet Air Gap Requirements (Palo Alto Networks) These offerings were designed to help organizations stay secure while adapting to the tremendous am... read more.

  • June 09, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/22 The Evolving Landscape of Distributed Application Security: Beyond Network Firewalls (F5) With the dispersion of application services across highly distributed environments, security has become an infinitely more complex endeavor. https://bit.ly/3MNtaRB The Seven Types of Non-human Identities to Secure (CyberArk) Being aware of all the different identity types in your organization and understanding all the different security needs that must be considered are the first steps to building a co... read more.

  • June 02, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/15 The Value of Holistic Visibility: Putting it All Together (Arctic Wolf) Organizations have too many tools feeding them more information than their staff can handle, and partially because those tools are siloed off and improperly managed, preventing comprehensive information and complete understanding of what’s happening within an organization’s IT infrastructure. https://bit.ly/44VGWsB Ransomware Roundup – Maori (Fortinet) FortiGuard Labs recently came across a new ransomw... read more.

  • May 19, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/8 The Importance of Identity and Access Management (Arctic Wolf) Proper IAM management is a discipline that involves people, processes, and technologies, and is an ongoing journey that follows what is referred to as the access management lifecycle. https://bit.ly/3M6jZLI Cyber as a Shared Responsibility; How Rubrik and Zscaler Stepped Forward (Rubrik) Over the past few years as ransomware and other threats have increased, private sector companies have embarked on aggressive journeys to reduce... read more.

  • May 12, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/1 Why Ransomware and Business Email Compromise Remain Top Attack Types (Arctic Wolf) The continued increase in cybercrime and breach attempts is not a new trend. For years now, the percentages have ticked upwards, and though cybersecurity has evolved, so have hackers seeking data, money, or infamy. https://bit.ly/3VjwGpm AI Powers the Branch of the Future, Today (Palo Alto Networks) With the establishment of hybrid work as a long-term trend and the exponential increase in cloud usage, organiza... read more.

  • May 05, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/24 Break the Attack Chain—Protect People, Defend Data (Proofpoint) Recently, we’ve seen a rise in cyber criminals “triple dipping” from data exfiltration. They’re getting paid to return stolen data, destroy that stolen data and reveal what modifications were made to the returned data. https://bit.ly/3n0fXuE Global Threat Trends and the Future of Incident Response (Varonis) As organizations have gotten better at recovering from ransomware attacks, threat actors mov... read more.

  • April 28, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/17 General Availability of Check Point CloudGuard Network Security with Azure Gateway Load Balancer (Check Point) With CloudGuard, customers can now protect their data, applications and services from potential threats in the cloud with greater security efficacy, and the integration simplifies and improves the design of secure Azure deployments. https://bit.ly/41c0LJV Enable seamless agent upgrades with Citrix WEM (Citrix) Citrix Workspace Environment Management (WEM) agent upgrades are importa... read more.

  • April 21, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/10 Diving deep into Citrix zero trust architecture (Citrix) As enterprises migrate toward a mature zero trust architecture, it is important to understand the core concepts of how to design the architecture and how to configure the environment to satisfy the tenets of a zero trust architecture. https://bit.ly/3mj2LAE AI, ChatGPT and Identity Security’s Critical Human Element (CyberArk) As public debate and regulatory scrutiny around artificial intelligence (AI) and machine learning (ML) i... read more.

  • April 14, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/3 Last week, six people in Nashville lost their lives senselessly. Too often, we hear devastating news like this, and then move on, in the hope it never happens to us, or to our families, friends, or colleagues.   Today, Gotham will take six minutes from our days to remember those lost in last week’s tragedy. We ask you do the same, to keep these and all the other victims in your hearts, and to push for change. What’s new with Citrix — March 2023 (Citrix) This year h... read more.

  • April 07, 2023