Articles In Technology Week in Review

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/20 Cisco releases security fixes for critical VPN, router vulnerabilities Over this week, Cisco added its own contribution, with the networking giant releasing patches for 34 bugs, the most severe of which can be exploited to conduct remote code execution and privilege escalation attacks. https://zd.net/2OG41JV Check Point IoT Protect Uses Automation and Threat Intelligence to Prevent the most advanced IoT cyber-attacks Connecting IoT devices to your network extends the attack surface for cybe... read more.

  • July 24, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/13 Why Good Cyber Security Starts with Great Data Management (NetApp) Above all else, good security management is predicated on good data management. Along every step of the security journey – from prevent to detect to respond – knowing where your data is, how to extract it, and how it interoperates across and beyond organizational boundaries are key to ensuring you protect yours and your customers’ most valuable intelligence. https://ntap.com/2OgLiEu This botnet has surged ba... read more.

  • July 17, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/29 Pure Storage Recognized as a Leader in Enterprise Flash Array Storage and Object Storage Categories TrustRadius has recognized both FlashArray and FlashBlade as 2020 Top Rated Award winners. With a combined average trScore of 9/10 and more than 350 verified customer reviews and ratings, FlashArray won in the Enterprise Flash Array Storage category and FlashBlade won in the Object Storage category. https://bit.ly/3eJtLjD Okta, CrowdStrike, Netskope, and Proofpoint Join Together to Secure Remo... read more.

  • July 10, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/22 Rendering Ransomware Worthless (Nutanix) Disclaimer: there is no silver bullet when it comes to protecting against ransomware. It is a vast and expansive topic that can encompass many aspects of your IT infrastructure, including network, compute, memory, storage, and disaster recovery, among others. https://bit.ly/2Cq8wFj New subscription options for on-premises Citrix Workspace solutions Citrix recognizes that not every customer is ready to make the move to cloud services. This is why Citr... read more.

  • June 26, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/8 Tycoon Ransomware Banks on Unusual Image File Tactic While initial information shows a very targeted attack, it illustrates the notion that criminal groups are seeking new ways to avoid detection once inside an organization. https://bit.ly/2XFVgVo Security Without Barriers, Part Two: Planning for Cyber Resilience (FireEye) For many organizations, recent world events have accelerated their adoption of cloud computing and increased their reliance on remote workers. This shift continues a trend... read more.

  • June 19, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/1   Cisco to acquire internet monitoring solution ThousandEyes Cisco’s Todd Nightingale, writing in a blog post announcing the deal said that the kind of data that ThousandEyes provides around internet user experience is more important than ever as internet connections have come under tremendous pressure with huge numbers of employees working from home. https://tcrn.ch/2XmenDJ PonyFinal Ransomware Targets Enterprise Servers Then Bides Its Time “PonyFinal attackers have been s... read more.

  • June 05, 2020

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 5/26 ThreatList: People Know Reusing Passwords Is Dumb, But Still Do It Researchers said that password reuse was the biggest security faux pas being committed by respondents. In fact, password reuse has actually gotten worse over the years: When asked how frequently they use the same password or a variation, 66 percent answered “always” or “mostly” – which is up 8 percent from the same survey in 2018. https://bit.ly/3glWxbn Is Disaster Recovery Really Ransomware Rec... read more.

  • May 29, 2020

By Eric Corcoran, Posted in Technology Week in Review

ICYMI: Check out the link below if you missed our latest live panel webinar "Incident Response: How to Detect & Recover Remotely". https://bit.ly/2XaFz73 Monday 5/18 Ready-made COVID-19 Themed Phishing Templates Copy Government Websites Worldwide (Proofpoint) Threat actors are continuing to try and take advantage of people worldwide as the pandemic continues—and most recently their efforts have included using fake websites, associated with COVID-19 financial assistance, to steal credentials. ... read more.

  • May 21, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/11 Microsoft and F5: Together Addressing Secure Remote Access and Productivity (F5 Networks) F5 BIG-IP APM and Azure Active Directory simplify the user experience for application access by enabling users to log in once and access all applications they have the right to access, from a single location. https://bit.ly/2zuVdC0 We Are Excited to Announce the Acquisition of The Defence Works (Proofpoint) The Defence Works’ award-winning content will be integrated into our broader Proofpoint Se... read more.

  • May 15, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/4 FlashBlade 3.0: The Solution for Modern Unstructured Data (Pure Storage) FlashBlade uniquely solves for multi-dimensional performance, agility, and simplicity with the efficiencies of public cloud, but in your data center. https://bit.ly/2xu9vCi CursedChrome turns your browser into a hacker's proxy Once the attacker has connected to an infected host, they can then navigate the web using the infected browser, and by doing so, hijack logged-in sessions and online identities to access forbidden... read more.

  • May 08, 2020