Articles In Technology Week in Review

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/14 Identify and Investigate Business Email Compromise (BEC) Scams (Varonis) According to the FBI's recent IC3 report, Business Email Compromise was responsible for causing over $1.8 billion worth of losses to businesses in 2020, which greatly exceeds the losses attributed to other more publicized forms of cybercrime like ransomware ($29 million). https://bit.ly/350pUPy Cyber Operational Collaboration Is Key for the “Next Log4j” Response (Palo Alto Networks) A quick glance at cybers... read more.

  • February 18, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/7 New FortiGate 3000F Series Secures Digital Acceleration for Hybrid IT (Fortinet) The FortiGate 3000F is the latest addition to the NGFW portfolio, designed to help customers secure today’s hybrid IT campus and data center architectures. https://bit.ly/3GrL4Db Citrix EPA issue with Chrome/Edge 98 – Fixed with Microsoft Endpoint Manager Due to a new security feature in both Chrome and Edge version 98 (they both share the Chromium code), EPA (Endpoint Analysis) will no longer launch... read more.

  • February 11, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/31 CISA Releases Incident And Vulnerability Response Playbooks To Strengthen Cybersecurity For Federal Civilian Agencies “The playbooks we are releasing today are intended to improve and standardize the approaches used by federal agencies to identify, remediate, and recover from vulnerabilities and incidents affecting their systems,” said Matt Hartman, Deputy Executive Assistant Director for Cybersecurity. https://bit.ly/343VLyw Hybrid work is here to stay, and that’s a good t... read more.

  • February 04, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/17 Threat Update 71 – Security Predictions for 2022 (Varonis) 2021 was a challenging year for security professionals – the attacks and vulnerabilities seemed bigger and occurred more frequently. https://bit.ly/3fzpEc2 DHL Replaces Microsoft as Most Imitated Brand in Phishing Attempts in Q4 2021 (Check Point) In Q4, global logistics and distribution company DHL ended Microsoft’s long-standing reign as the brand most frequently imitated by cybercriminals in attempts to steal cr... read more.

  • January 28, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/10 What’s new with Citrix Workspace At Citrix, we continue to modernize workflows in our portfolio of product solutions to ensure customers receive a great digital experience regardless of device, location, time, or network. https://bit.ly/3nbNS0k Check Point Research: Cyber Attacks Increased 50% Year over Year Check Point Research (CPR) today reports that from mid-2020 throughout 2021, there has been an upwards trend in the number of cyber-attacks. This trend reached an all-time high at... read more.

  • January 14, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/20 How to drive innovation and productivity for your distributed workforce (Citrix) Delivering a secure and productive hybrid-work experience that drives innovation everywhere is one reason Citrix created Citrix Workspace. To make it simpler than ever to support hybrid-work innovation and collaboration, Citrix Workspace empowers distributed workforces with a unified and streamlined work experience. https://bit.ly/3pcMEmZ Brute Force Attack: Definition, Types, and Prevention (Varonis) While th... read more.

  • January 07, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/13 EDR vs Enterprise Antivirus: What’s the Difference? (SentinelOne) For decades, organizations and businesses have invested in Antivirus suites in the hope of solving the challenges of enterprise security. But as the sophistication and prevalence of malware threats has grown over the last ten years, so the shortcomings of what is now referred to as “legacy” Antivirus have become all too apparent. https://bit.ly/3EUj8aQ Protect Yourself Against The Apache Log4j Vulnerability... read more.

  • December 20, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/6 Check Point CloudGuard Network Security streamlines operational efficiency with as-a-Service solution on AWS Check Point is honored and excited to take cloud security innovation to the next level through its integration with AWS Gateway Load Balancer and AWS Managed Gateway Endpoints. https://bit.ly/3EyKenR Password-stealing and keylogging malware is being spread through fake downloads Cybersecurity researchers disclose a newly discovered campaign that users custom malware to steal username... read more.

  • December 10, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/29 The top 10 FAQs from our Citrix Virtual Apps and Desktops webinar From on-premises environments to cloud and hybrid deployments, there is a ton to love about the latest updates. https://bit.ly/3p9aM8S Fortinet Announces New Service Offerings on AWS, Including Custom-Built Cloud Architectures Fortinet is pleased to announce new Cloud Consulting Service offerings in AWS Marketplace to help customers simplify and future-proof their application journeys on AWS and across hybrid and multi-cloud... read more.

  • December 03, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/15 5 Key E-Commerce Holiday Shopping Cyberattacks to Secure, Defend, and Protect Against (F5) Over 1 million stolen credentials are reported every day, and underground markets have industrialised cyber crimes and fraudulent activities. Automation, malicious bots, and manual attacks expose users and businesses to fraud, which led to a 65% increase in successful fraud attempts from 2019 to 2020. https://bit.ly/3wMYw17 Tracking Upward and Innovating for our Customers—Together (Okta) Okta w... read more.

  • November 19, 2021