This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On March 26, 2021

Monday 3/22

Gotham has earned a spot on CRN’s 2021 Tech Elite 250 list, recognizing us as one of the top IT solution providers in North America. We are proud to continue to provide the best service for our customers.

http://bit.ly/3c9xhVJ

Attacker Economics and the Lure of Credential Stuffing (F5)

F5 Labs and Shape Security research recently reported that credential spill incidents nearly doubled from 2016 to 2020.

http://bit.ly/315H6Oe

Okta and Proofpoint: Uniting People-centric Security and Identity to Protect Users Against Phishing

Strong email security and identity-centric remediation tools can help enterprises confidently automate incident response to reduce response time and help turn the tide against credential phishing attacks.

http://bit.ly/2Qp8Ye1

Tuesday 3/23

What’s new with Citrix Virtual Apps and Desktops – March 2021

We’re rolling into the new year right where we left off, continuing to release new features that help our customers adapt to business challenges and securely deploy a digital workspace with confidence, regardless of where they are on their cloud journey.

http://bit.ly/3vRZ7xH

How To Avoid the Costly Risks of Cloud Misconfigurations (FireEye)

Federal agencies require continuous visibility across their cloud services, and a way to automatically notify teams when a misconfiguration is identified. Doing so not only improves cloud security, it also enhances collaboration and governance.

http://bit.ly/3rixtpT

Join us, Citrix, and IGEL on Thursday, April 8, at 11:00 AM for our “Work from Anywhere” experience. Citrix and IGEL can help organizations of any size to better connect your people to their desired apps, desktops, and cloud workspaces – from anywhere. See the link below for more details:

http://bit.ly/3skZVsU

Wednesday 3/24

Different IoT Breach, Same (In)Security Story, Broader Consequences (CyberArk)

The good news is consensus is growing that IoT devices – especially those used by enterprises and government agencies – must be treated with the same attention and gravity as traditional IT systems.

https://bit.ly/3rmMfvP

FBI: Phishing emails are spreading this sophisticated malware

A new spear-phishing campaign is attempting to infect PCs with Trickbot, one of the most prevalent and potent forms of malware around today, a joint advisory from the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) has warned.

https://zd.net/399bVpA

Thursday 3/25

Danielle Maurici-Arnone – RB (Toggle Magazine)

Danielle Maurici-Arnone is well aware of the burgeoning online market, and as CIO for RB’s North American Health and Nutrition division, she says the company needs diverse channels and looks to develop personal relationships to enable sustained growth.

https://bit.ly/2P7AXhZ

One Size Does Not Fit All: Flexible Response Capabilities Matter (CrowdStrike)

Organizations big and small need a range of response capabilities. CrowdStrike believes that a combination of automation and analyst-driven intervention provides the flexibility organizations need for effective and efficient incident response workflows.

https://bit.ly/3cjpswI

Overcoming Multi-cloud Security Challenges with Secure SD-WAN (Fortinet)

Despite its many benefits, multi-cloud adoption adds extra layers of management complexity, especially when cloud services are added in an ad hoc manner rather than being planned. This complexity creates management and operational challenges and increases operational costs.

https://bit.ly/39f1zEL

Friday 3/26

How to Use Azure Private Endpoints to Restrict Public Access to WebApps (Varonis)

Azure Private Endpoint is a read-only network interface service associated with the Azure PAAS Services. It allows you to bring deployed sites into your virtual network, limiting access to them at the network level.

https://bit.ly/3rymPMd

Report Finds Surge in Malware Aimed at MacOS

A steady increase in Mac sales makes developing malware for macOS more lucrative for hackers, while the establishment of malware-as-a-service has made creating malicious code easier than ever before.

https://bit.ly/3lUC1BY