Articles by 'Eric Corcoran'

Blog Author - Eric Corcoran

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/22 Citrix Features Explained: Improving end-user security with Citrix Secure Private Access (Citrix) Citrix Secure Private Access was created to balance security and user experience, delivering robust, adaptive, and VPN-less security without interfering with the preferred workflows of hybrid employees. https://bit.ly/3R2tRWA Escaping Ransomware Jail: Protection Before, During, and After an Attack (Pure Storage) Ransomware isn’t going away anytime soon. It’s “not if but when.&... read more.

  • September 02, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/15 CrowdStrike and Industry Partners Release Open Cybersecurity Schema Framework (CrowdStrike) The OCSF is an open source effort among industry leaders to break down the data silos that hamper security teams’ efforts to detect, investigate and stop cyberattacks https://bit.ly/3JS8BjX Extend Proofpoint DLP to Third Parties with ICAP (Proofpoint) With data expected to grow at 23% annually, automation and consolidation of security operations is essential if security teams are to keep up. Pr... read more.

  • August 19, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/8 Behavioral Analysis and AI/ML for Threat Detection: Going Behind the Scenes on the Newest Detection Engine from Proofpoint (Proofpoint) The new Supernova Behavioral Engine improves our already leading efficacy, while ensuring low false positives for customers. We’re also committed to transparency, especially given how much vendor noise there is around the use of AI/ML. https://bit.ly/3QbYRmU What Is SQL Injection? Identification & Prevention Tips (Varonis) Applications tend to be a... read more.

  • August 12, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/25 New Global OT and Cybersecurity Report Outlines Key Challenges for Industrial Organizations (Fortinet) Besides providing the latest statistics on the state of OT cybersecurity, the 2022 State of Operational Technology and Cybersecurity Report offers insights on how best to handle OT vulnerabilities and how best to strengthen an organization’s overall security posture. https://bit.ly/3cIPwUZ LinkedIn Still Number One Brand to be Faked in Phishing Attempts while Microsoft Surges up the R... read more.

  • August 05, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/11 Wide Open Outbound Firewall Policy – Part 2 A loose outbound Internet policy may only become visible after a firm is affected by a ransomware event. Until then, it is too easy for firewall administrators to overlook the weakness of the loose outbound Internet policy. https://bit.ly/3Iug3B2 Data Privacy Requires Protection against Credential Stuffing (F5) Credential stuffing is a cybercrime whereby criminals test stolen credentials against websites in order to take over accounts. Crimi... read more.

  • July 25, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/27 The Importance of a Consistent Security Policy (Palo Alto Networks) Building upon industry-leading security technologies in conjunction with strong technology partnerships, Palo Alto Networks can help you consolidate your approach to security while maintaining crucial IT business continuity. https://bit.ly/3A3Isvt What is an Insider Threat? Definition and Examples (Varonis) The individual doesn’t need to be an employee, and the harm may not even be deliberate, but insider threats are... read more.

  • July 08, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/20 ICYMI: Ken Phelan, was joined by Gotham’s EUC & Cloud Practice Director, Brian Wagner, and Rubrik, Inc.’s Christopher Culver and Drew Russell for a discussion surrounding Modern Resiliency. https://www.youtube.com/watch?v=XO9-Z3J_5_8 Make device management simpler with Citrix Provisioning Services (Citrix) Citrix has made many optimizations and tweaks throughout the years to ensure that PVS performs at its best from the perspective of device check-ins, failover times, and sca... read more.

  • June 24, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/13 A True Converged Platform Starts with a Powerful Network Firewall (Fortinet) In these new hybrid network environments, security cannot function as a standalone solution. Instead, security must be seamlessly converged with the underlying network, enabling protections to dynamically adapt to a constantly shifting network. https://bit.ly/3Hi8A7r Paying Ransomware Paints Bigger Bullseye on Target’s Back Paying ransomware attackers doesn’t pay off and often paints a bigger target on... read more.

  • June 17, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/6 Brute-Force Attacks: How to Defend Against Them (Arctic Wolf) When you hear the words “brute force," subtlety is probably not the first thing that comes to mind. Indeed, classic brute-force cyber attacks use the most straightforward tactics—trial and error—to gain entry into a protected system. https://bit.ly/39aAENA State of Application Strategy 2022: Security Shifts to Identity (F5) But it’s not just that identity and access have risen to become the most deployed te... read more.

  • June 10, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/23 2022 Cloud Security Report (Fortinet) The 2022 Cloud Security Report reveals how security executives and practitioners are using the cloud, how their organizations are responding to security threats in the cloud, and the challenges they are facing. Let’s look at some of the highlights from this year’s report. https://bit.ly/3LIp9tU ABAC vs. RBAC: What’s the Difference? (Citrix) These types of access control models determine authorization based on who the user is and what r... read more.

  • June 03, 2022