Articles In Technology Week in Review

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/21 Cloud Services Under Attack: Closing the Virtual Open Doors to Cyber Crime (Check Point) Tightening cloud security isn’t just about having the right products and services in place, it’s also about nurturing a security-first mentality within an organization as a whole. https://bit.ly/3Jx1Ov8 What Is a Botnet? Definition and Prevention (Varonis) Botnets can be used in other ways and have been known to be leveraged by criminal hacker groups to steal data and further compromise othe... read more.

  • March 25, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/14 A Defense-in-Depth Strategy to Phishing Prevention (Proofpoint) As the threat landscape continues to evolve, organizations need to invest in multilayered defenses to stop threats that target people. It’s important to shift budgets as necessary to the threats causing the greatest risk and impact to organizations. https://bit.ly/3JbfonH Key Findings from the 2H 2021 FortiGuard Labs Threat Report (Fortinet) The 2021 threat landscape presented several new challenges for security teams. Bu... read more.

  • March 18, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/7 Your Blueprint to Implement an Insider Threat Management Program (Proofpoint) Organizations need to adopt a new mindset to efficiently adapt to this new normal, one that enables a transformation of their insider threat management strategies. It starts by understanding the insider threat risk. https://bit.ly/3vH3Jcl Service Continuity in Citrix Cloud: A recipe for resiliency Citrix admins can put service continuity to the test and proceed with enabling it in their production environment. If y... read more.

  • March 11, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/21 Simplify IT administration with Workspace Environment Management (Citrix) The Scripted Task solution in Workspace Environment Management (WEM) helps to simplify the management of your daily tasks through these scripts, ensuring the security of the scripts you’re deploying and running without adding complexity to your day. https://bit.ly/3InrfyJ 6 Ways Big Data Analytics Can Drive Down Costs (Pure Storage) More businesses are using big data to cut costs and increase profits. It’s... read more.

  • March 04, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/14 Identify and Investigate Business Email Compromise (BEC) Scams (Varonis) According to the FBI's recent IC3 report, Business Email Compromise was responsible for causing over $1.8 billion worth of losses to businesses in 2020, which greatly exceeds the losses attributed to other more publicized forms of cybercrime like ransomware ($29 million). https://bit.ly/350pUPy Cyber Operational Collaboration Is Key for the “Next Log4j” Response (Palo Alto Networks) A quick glance at cybers... read more.

  • February 18, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/7 New FortiGate 3000F Series Secures Digital Acceleration for Hybrid IT (Fortinet) The FortiGate 3000F is the latest addition to the NGFW portfolio, designed to help customers secure today’s hybrid IT campus and data center architectures. https://bit.ly/3GrL4Db Citrix EPA issue with Chrome/Edge 98 – Fixed with Microsoft Endpoint Manager Due to a new security feature in both Chrome and Edge version 98 (they both share the Chromium code), EPA (Endpoint Analysis) will no longer launch... read more.

  • February 11, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/31 CISA Releases Incident And Vulnerability Response Playbooks To Strengthen Cybersecurity For Federal Civilian Agencies “The playbooks we are releasing today are intended to improve and standardize the approaches used by federal agencies to identify, remediate, and recover from vulnerabilities and incidents affecting their systems,” said Matt Hartman, Deputy Executive Assistant Director for Cybersecurity. https://bit.ly/343VLyw Hybrid work is here to stay, and that’s a good t... read more.

  • February 04, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/17 Threat Update 71 – Security Predictions for 2022 (Varonis) 2021 was a challenging year for security professionals – the attacks and vulnerabilities seemed bigger and occurred more frequently. https://bit.ly/3fzpEc2 DHL Replaces Microsoft as Most Imitated Brand in Phishing Attempts in Q4 2021 (Check Point) In Q4, global logistics and distribution company DHL ended Microsoft’s long-standing reign as the brand most frequently imitated by cybercriminals in attempts to steal cr... read more.

  • January 28, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/10 What’s new with Citrix Workspace At Citrix, we continue to modernize workflows in our portfolio of product solutions to ensure customers receive a great digital experience regardless of device, location, time, or network. https://bit.ly/3nbNS0k Check Point Research: Cyber Attacks Increased 50% Year over Year Check Point Research (CPR) today reports that from mid-2020 throughout 2021, there has been an upwards trend in the number of cyber-attacks. This trend reached an all-time high at... read more.

  • January 14, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/20 How to drive innovation and productivity for your distributed workforce (Citrix) Delivering a secure and productive hybrid-work experience that drives innovation everywhere is one reason Citrix created Citrix Workspace. To make it simpler than ever to support hybrid-work innovation and collaboration, Citrix Workspace empowers distributed workforces with a unified and streamlined work experience. https://bit.ly/3pcMEmZ Brute Force Attack: Definition, Types, and Prevention (Varonis) While th... read more.

  • January 07, 2022