Articles In Technology Week in Review

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/23 2022 Cloud Security Report (Fortinet) The 2022 Cloud Security Report reveals how security executives and practitioners are using the cloud, how their organizations are responding to security threats in the cloud, and the challenges they are facing. Let’s look at some of the highlights from this year’s report. https://bit.ly/3LIp9tU ABAC vs. RBAC: What’s the Difference? (Citrix) These types of access control models determine authorization based on who the user is and what r... read more.

  • June 03, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/16 The Move to Modernize Ops Will Increase the Need for Software Supply Chain Security (F5) The one thing we’ve learned from DevOps that you cannot ignore as you modernize ops is that SRE practices will incur much of the same technical debt and security challenges. https://bit.ly/3MqMx0o Cybersecurity 101: Basic Terminology You Need to Know (Arctic Wolf) The constantly changing world of cybersecurity can leave you longing for an understanding of today's modern threats. A solid foundation... read more.

  • May 23, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/9 We would like to welcome Mark Taylor to Gotham Technology Group. Working with our highly accomplished Outside Sales team, Mark will help us meet the increased market demand for IT security and infrastructure services. We are excited to have you join us! https://www.linkedin.com/in/mark-taylor/ Improved Phishing Reporting and Remediation with Email Warning Tags “Report Suspicious” (Proofpoint) Our HTML-based email warning tags have been in use for some time now. And we’re hap... read more.

  • May 13, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/2 What’s new and next with Citrix Virtual Apps and Desktops: Q&A (Citrix) With our updates on the Long-Term Service Release (LTSR), optimizing unified communications platforms, security enhancements, and more, there are a number of enhancements we want to dive deep into. https://bit.ly/39wOhXg Cracks forming in the ransomware ecosystem (Check Point) Thanks to the efforts of white hat researchers and security specialists, as well as governments around the world now strengthening their... read more.

  • May 06, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/25 Get more out of your native Azure Virtual Desktop with the Citrix Optimization Pack (Citrix) The Citrix Optimization Pack for Azure Virtual Desktop is a new Citrix offering for optimizing native Azure Virtual Desktop workloads. It includes Workspace Environment Management (WEM) service within Citrix Cloud as the primary offering, which you can use to better manage, optimize, and secure your native Azure Virtual Desktop environments. https://bit.ly/3xMTVi1 Not All Firewalls Can Do Zero Trust... read more.

  • April 29, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/18 ICYMI: Gotham’s CTO, Ken Phelan, was joined by Palo Alto Networks’ Field CTO, Jason Georgi, where they discussed Secure Access Service Edge (SASE) and if the technology is ready for primetime. See the link below for the full video. https://bit.ly/3xvtm0G Wide Open Outbound Firewall Policy – Part 1 Although the open policy allows for ease of use (for systems administrators), it also introduces significant risks attached to users operating applications that are in the range f... read more.

  • April 22, 2022

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 4/5 Spring4Shell flaw: Here's why it matters, and what you should do about it While there was initial debate about how serious the bug is, sleuthing by security researchers in the days afterwards after the flaw was discovered revealed that Spring4Shell was indeed a serious bug that warranted attention. https://zd.net/3DEMPNv From SolarWinds to Log4j: The global impact of today’s cybersecurity vulnerabilities (Check Point) The case for organizations of all shapes and sizes to have a compre... read more.

  • April 08, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/28 CISA Adds 66 Known Exploited Vulnerabilities to Catalog CISA has added 66 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise. https://bit.ly/3DkrkRH From the Shotgun Approach to Triple Extortion: The Evolving Ransomware Threat (Fortinet) Although overall ransomware remains a top concern, there ar... read more.

  • April 01, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/21 Cloud Services Under Attack: Closing the Virtual Open Doors to Cyber Crime (Check Point) Tightening cloud security isn’t just about having the right products and services in place, it’s also about nurturing a security-first mentality within an organization as a whole. https://bit.ly/3Jx1Ov8 What Is a Botnet? Definition and Prevention (Varonis) Botnets can be used in other ways and have been known to be leveraged by criminal hacker groups to steal data and further compromise othe... read more.

  • March 25, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/14 A Defense-in-Depth Strategy to Phishing Prevention (Proofpoint) As the threat landscape continues to evolve, organizations need to invest in multilayered defenses to stop threats that target people. It’s important to shift budgets as necessary to the threats causing the greatest risk and impact to organizations. https://bit.ly/3JbfonH Key Findings from the 2H 2021 FortiGuard Labs Threat Report (Fortinet) The 2021 threat landscape presented several new challenges for security teams. Bu... read more.

  • March 18, 2022