Articles In Technology Week in Review

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/20 3 Ways Visualization Improves Cloud Asset Management and Security (CrowdStrike) While it’s important to understand the relationships and potential vulnerabilities of your cloud assets, the practice of managing these systems is complicated by the ever-changing nature of cloud environments. http://bit.ly/417Bwsr Ransomware Roundup – CatB Ransomware (Fortinet) CatB is a reasonably new entrant to the ransomware field, with samples only dating back to December 2022. The ransom demand... read more.

  • February 24, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/13   Make Compliance a Breeze with Modern Log Management (CrowdStrike) While regulations vary by country and industry, nearly every organization must store compliance-relevant information for a certain period of time. The trouble comes when you’ve got an assortment of tools emitting logs in an inconsistent fashion. http://bit.ly/3DY9Tbm Machine Creation Services support for catalogs with Azure VM extensions (Citrix) Adding Azure VM extensions to your machine catalogs is a powerful... read more.

  • February 17, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/6 CrowdStrike Announces Expanded Service Integrations with AWS (CrowdStrike) On January 31, 2023, AWS announced CloudTrail Lake Partner Integrations, with CrowdStrike signing on as a launch partner. With this integration, organizations get the opportunity for a consistent security posture between on-premises workloads and those running in the AWS cloud. http://bit.ly/3jwQeYY Ransomware Roundup – Trigona Ransomware (Fortinet) The Ransomware Roundup report aims to provide readers with brie... read more.

  • February 10, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/30 Why Small Businesses Choose CrowdStrike (CrowdStrike) A cyberattack can cause significant damage to any organization. But for SMBs, a security incident that causes productivity loss, financial trouble or reputation harm can be devastating. https://bit.ly/3DpxJMM Introducing Automated Posture Management: Fix Cloud Security Risks with One-Click (Varonis) With how quickly SaaS and IaaS apps add new features and functionality, it can be difficult to make sure they’re always configured pro... read more.

  • February 03, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/23 3 Easy Steps for End-to-End XDR with CrowdStrike and Zscaler (CrowdStrike) With the erosion of the corporate network perimeter and increased employee access to sensitive information from remote locations, corporate endpoints are left out in the wild and are often difficult to monitor for suspicious activity. http://bit.ly/3WsqIBz Fewer ransomware victims are paying up. But there's a catch Cyber criminals are finding it harder to make money from ransomware attacks. But that doesn't mean rans... read more.

  • January 27, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/16 2023 Trends: Disparities emerge in cybersecurity capabilities between private and public organizations (Cybersixgill) Come 2023, in the United States – there will be different experiences for the government versus companies, with the private sector on its own regarding the increasing number and ferocity of attacks – as they currently are. http://bit.ly/3GJNajR SRE Brings Modern Enterprise Architectures into Focus (F5) There’s more to assessing the performance and reliabili... read more.

  • January 20, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/9 Why Intelligent Privilege Controls Are Essential for Identity Security (CyberArk) Intelligent privilege controls must work in conjunction with one another to secure access for every identity. Continuous and constant monitoring and analysis of all activities of every identity allow organizations to detect and respond to unusual behavior. https://bit.ly/3WYBiS3 Learning From the Past — Ten 2022 Cybersecurity Events to Know (Palo Alto Networks) Threat actors are tremendously fond of recyc... read more.

  • January 16, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/19 Introducing Pure Storage FlashRecover//S, Powered by Cohesity (Pure Storage) Jointly architected by Pure Storage and Cohesity, FlashRecover//S is designed to deliver a powerful yet easy-to-use solution with multiple levels of built-in ransomware protection. https://bit.ly/3HMXYjb 2023 Cybersecurity Trends We’re Tracking (CyberArk) Cybersecurity doesn’t happen in a vacuum. Evolving attack trends, world events, regulatory changes, shifting organizational priorities and many other... read more.

  • January 06, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/12   Client-Side Defense: The Missing Piece in Your Holiday Security Armor (F5) Without visibility into the code that runs in your environment, companies cannot detect when code has changed or been compromised. These scripts provide threat actors a wide attack surface to exploit, allowing security incidents to occur directly in the customer’s browser without the user or merchant realizing it. https://bit.ly/3iWkbBa Pure Storage CEO: ‘The Days Of The Hard Disk In The Data Cent... read more.

  • December 16, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/5 Cloud Migration On Your Identity Security Terms (CyberArk) Companies of all sizes continue flocking to the cloud for its many business benefits: Reduced infrastructure costs, increased flexibility and more dynamic application development, to name a few. https://bit.ly/3Y1ydBp Citrix DaaS is now available on AWS Marketplace! (Citrix) Citrix and AWS are making it easier than ever to leverage joint solutions. With Citrix DaaS on AWS, customers can purchase, deploy, and manage their desktop dep... read more.

  • December 09, 2022