The Past Few Weeks in Technology

The Past Few Weeks in Technology

By Eric Corcoran
Posted in Technology Week in Review
On January 10, 2020

Monday 12/23

Cloud Mobility using Nutanix Move (via Nutanix)

Available to all Nutanix customers, Move 3.4 will support moving VMs back and forth between Nutanix AHV and AWS. With this capability, you can move your running applications across completely different infrastructure stacks/clouds with very minimal downtime and zero manual efforts.

http://bit.ly/2Q8wXdK

Announcing the Citrix Virtual Apps and Desktops 1912 LTSR (via Citrix)

The Citrix Virtual Apps and Desktops 7 1912 Long-Term Service Release (LTSR) is now available for download. This LTSR brings two years’ worth of new functionality and feature enhancements to customers currently running 7.15 LTSR and gives our Current Release (CR) customers a chance to take advantage of all the latest updates.

http://bit.ly/2QdtzOJ

Thursday 1/2

How Cybersecurity is Becoming (Even) More Relevant (via F5 Networks)

To better address the security landscape described above, F5 has introduced its Threat Campaigns subscription as an add-on service to F5 Advanced WAF. The service helps customers protect their applications and IT infrastructure from sophisticated attacks by detecting active attack campaigns and malware.

http://bit.ly/2ZIiz0h

Friday 1/3

What is CDM and How Does Varonis Help? (via Varonis)

Varonis is a data-centric security suite that identifies permissions, classifies sensitive data, and detects threats to data. One of the core tenents of CDM is protecting data, and Varonis protects data first.

http://bit.ly/2ZKhOUq

Check Point Extends Leadership in Cloud Security with Unmatched Serverless Protection (via Check Point)

Check Point will be integrating innovative serverless security technology into its Infinity architecture, the market leading consolidated security solution to support Networks, Mobile, Endpoint, IoT and Cloud environments.

http://bit.ly/36nF6lh

Monday 1/6

Six Obstacles That Block the Way to Effective Lifecycle Management (via Okta)

While lifecycle management is often performed manually by IT and HR teams, automating the process can simplify the task by adopting a policy-driven, contextual approach.

http://bit.ly/36wdPgS

Attack of the Bots: Why They Now Threaten Your Cybersecurity (via Arctic Wolf)

As bots continue to increase in sophistication, IT teams find it harder and harder to tell the bad bots from the good, or even from human users.

http://bit.ly/2tyIPOu

Tuesday 1/7

Citrix App Layering and FSLogix profile containers (via Citrix)

Many customers I talk to think that FSLogix and Citrix App Layering technologies compete with each other. However, the products are fairly different in their scope: FSLogix targets the user profile or a subset of the profile and the App Layering user layer is all-encompassing, with all desktop writes going into it.

http://bit.ly/2N1D6Yg

FBI Warns of Maze Ransomware Focusing on U.S. Companies (via Bleeping Computer)

According to the F.B.I. alert, the threat actors behind Maze ransomware use several methods to breach a network, which include fake cryptocurrency sites and malspam campaigns that impersonate government agencies and security vendors.

http://bit.ly/2Qu6cSq

Wednesday 1/8

3 Game-Changing Reasons to Deploy User Identity Access Management (via Guardicore)

Besides isolating sensitive data or essential assets in the enterprise data center, User Identity Access Management is the next essential layer of control, establishing with fine-grained policy exactly which users can access various applications in the first place, and how.

http://bit.ly/2sZLwbR

This password-stealing malware just got updated with new tactics to help it hide better (via ZDNet)

A hacking campaign that infects victims with username and password-stealing malware has been updated with new tricks as cyber criminals look to make their attacks more efficient, stealthier and more lucrative.

https://zd.net/2Fxdqi8

Thursday 1/9

Lost and Found: App proliferation leads to lack of insight (via F5 Networks)

It's no surprise that most organizations are in the dark about application usage. After all, most aren't even aware of how many applications are in use across the business. That's not necessarily their fault; a study from Harmon.ie found that nearly half (48%) of respondents regularly used applications not authorized by IT in the workplace.

http://bit.ly/2N51dFJ

Veeam To Be Acquired By Insight Partners In $5B Deal (via CRN)

New York-based Insight Partners on Thursday unveiled its planned acquisition of Veeam with an eye on bringing new resources to bear on building Veeam's U.S. business to take advantage of the need for cloud-based data management and data protection.

http://bit.ly/2R6NoYG

Fortinet Receives Industry Awards for Transforming the SD-WAN Market (via Fortinet)

Unlike many SD-WAN solutions, Fortinet Secure SD-WAN is one of the few solutions on the market that addresses the FULL range of challenges being faced by organizations, combining advanced connectivity and traffic and application management functionality with a full suite of integrated security solutions.

http://bit.ly/2QzqKsz

Friday 1/10

The Right Recipe for a Multi-Cloud Transition (via Rubrik)

Much like changing careers or moving to a new city, there’s never a good time  to lead a multi-cloud transition. No matter how you slice it, something could always get in the way, and at some point, you just have to take the plunge.

http://bit.ly/2tLOm4x

PayPal Confirms ‘High-Severity’ Password Security Vulnerability (via Forbes)

PayPal has confirmed that a researcher found a high-severity security vulnerability that could expose user passwords to an attacker.

http://bit.ly/2QHAh0N

Restricting Outlook Access to Exchange Online on Corporate Windows 10 Machines (via Gotham Technology Group)

The magic to this method of restricting Outlook access is through AAD Conditional Access policies. Conditional Access is based on the premise that the security needs of organizations today extend beyond the walls of the corporate network and must include user and device identity. Conditional Access policies allow an organization to control access to cloud-based apps based on conditions.

http://bit.ly/35FWII0