Articles In Technology Week in Review

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/12 Why a Data-resilient Architecture Is Critical for Recovery (Pure Storage) IT teams need to be prepared to recover quickly from an outage event, no matter the cause. See how Pure Storage can help speed your recovery efforts. https://blog.purestorage.com/solutions/why-a-data-resilient-architecture-is-critical-for-recovery/ Announcing the general availability of Citrix DaaS Backup + Restore (Citrix) Backup + Restore is now generally available for all Citrix DaaS customers. This powerful featur... read more.

  • August 16, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/5 Introducing native Conditional Authentication to Citrix Cloud! (Citrix) Prior to this release, only one type of authentication method was allowed natively. Multiple methods required the use of Adaptive Authentication which relies on NetScaler nFactor, which increases complexity. https://www.citrix.com/blogs/2024/08/02/introducing-native-conditional-authentication-to-citrix-cloud/ Tuesday 8/6 The Perils of Insecure Networks ft. Bryon Singh, RailWorks Corporation https://www.gothamtg.com/blog... read more.

  • August 09, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/29 Protecting Your Cloud Application Against Unknown Risks (Check Point) No system can ever be completely impervious to threats. Even with state-of-the-art protections in place, cloud security is never truly good enough if there remain unidentified vulnerabilities. https://blog.checkpoint.com/securing-the-cloud/protecting-your-cloud-application-against-unknown-risks/ Identity-based attacks and the identity attack chain (Delinea) Identity-based attacks progress in phases along what’s know... read more.

  • August 02, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/22 We're proud to have supported @AOfrockland this past Saturday during their walk around Rockland Lake. We are proud to sponsor The Arc of Rockland and support the individuals and families they serve. Click the link to learn more about The Arc of Rockland: https://arcofrockland.org/ 5 Threat Intelligence Solution Use Cases (Recorded Future) Cyber threats are becoming increasingly sophisticated and frequent, making it imperative for organizations to leverage cyber threat intelligence to stay a... read more.

  • July 26, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/15 Cybersecurity Stop of the Month: Reeling in DarkGate Malware Attacks from the Beach (Proofpoint) In a recent attack, a threat actor (TA571) used DarkGate to try to infiltrate over 1,000 organizations worldwide. The attack spanned across 14,000 campaigns and contained more than 1,300 different malware variants. https://www.proofpoint.com/us/blog/email-and-cloud-threats/darkgate-malware Tuesday 7/16 Preventing Unintentional Data Exposure ft. Bryon Singh, RailWorks Corporation https://www.got... read more.

  • July 19, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/8 The Growing Dichotomy of AI-Powered Code in Cloud-Native Security (Palo Alto Networks) Amidst the allure of newfound technology lies a profound duality – the stark contrast between the benefits of AI-driven software development and the formidable security risks it introduces. https://www.paloaltonetworks.com/blog/2024/07/the-growing-dichotomy-of-ai-powered-code-in-cloud-native-security/ Tuesday 7/9 You Cannot Pass ft. Bryon Singh, RailWorks Corporation https://www.gothamtg.com/blog/yo... read more.

  • July 12, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/1 Seeing the Unseen: Preventing Breaches by Spotting Malicious Browser Extensions (CrowdStrike) When an end user installs a browser extension, the permissions granted open the door to a world of possibilities — and vulnerabilities. Depending on what’s allowed, these extensions can access a veritable treasure trove of information. https://www.crowdstrike.com/blog/prevent-breaches-by-stopping-malicious-browser-extensions/ DMARC: Why It's Moving from a Best Practice to a Must-Have (Pro... read more.

  • July 05, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/17 5 Things to Do First During a Ransomware Attack (Pure Storage) Knowing the challenges you’ll face first and the immediate steps you can take during the early stages of an attack can help minimize loss, cost, and risk. https://blog.purestorage.com/perspectives/a-6-point-plan-for-the-during-of-a-data-breach/ Triage Your Cloud Security: Risk Prioritization Methods (CyberArk) Effective risk prioritization requires a nuanced understanding of risk dynamics and a strategic, adaptive approach... read more.

  • June 28, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/10 Announcing the inclusion of XenServer 8 in all new Citrix subscriptions! (Citrix) XenServer provides our Citrix platform customers the premium hypervisor capabilities optimized for Citrix workloads. Leveraging XenServer for your Citrix workloads helps you save money on 3rd party hypervisor solutions, while getting the most out of your Citrix deployment, with optimizations for Citrix only available from XenServer, such as PVS Accelerator, Intellicache, and MCS Read Cache. https://www.citrix.co... read more.

  • June 14, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/3 Major Botnets Disrupted via Global Law Enforcement Takedown (Proofpoint) Per Europol, in conjunction with the malware disruption, the coordinated action led to four arrests, over 100 servers taken down across 10 countries, over 2,000 domains brought under the control of law enforcement, and illegal assets frozen. https://www.proofpoint.com/us/blog/threat-insight/major-botnets-disrupted-global-law-enforcement-takedown Tuesday 6/4 Endpoint Management Upleveled: New device list functionality (C... read more.

  • June 11, 2024