This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On April 02, 2021

Monday 3/29

A Tale of Two Ransomware Attacks: Which Company Are You? (Pure Storage)

Ransomware attacks became a matter of not “if” but “when,” with experts predicting a ransomware attack every 11 seconds in 2021. Sophisticated cybercriminals continue to prey on vulnerabilities, and victims are giving in to demands and handing over cash to retrieve their encrypted data.

https://bit.ly/39oEwYc

FBI Internet Crime Report Shows that Email Fraud Represents the Largest Financial Losses in 2020 (Proofpoint)

The report reveals that victims of cybercrime reported 791,790 complaints with a total loss of $4.2 billion for the year—an increase of more than 300,000 complaints (up 69.4%) and $700 million reported losses (up 20%) for 2019.

https://bit.ly/3w4kA6N

Tuesday 3/30

The journey to Citrix Workspace and the value along the way

The great news for Citrix customers is that regardless of where they start their journey, they realize tangible value at every milestone along the way.

https://bit.ly/3frLIGY

Keeping Edge Computing Secure (Fortinet)

Today’s networks are far more distributed and complex than ever before. In particular, the shift to cloud and hybrid networks made traditional leased line networks used for routing traffic back to data centers less relevant.

https://bit.ly/3dgvrBT

Wednesday 3/31

Citrix and IGEL can help organizations of any size to better connect your people to their desired apps, desktops, and cloud workspaces – from anywhere. Join us on Thursday, April 8, at 11:00AM when Jesse Fasolo, Director, Technology Infrastructure and Cyber Security at St. Joseph’s Health discusses his transition to Citrix and where he sees Cloud technology and the workspace going in the years to come. Click the link below for registration details.

https://bit.ly/3skZVsU

Planning for the Unknown (Pure Storage)

From the beginning we have been modernising the fundamental IT infrastructures that enable organisations of all shapes, sizes and business models to achieve rapid agility. Not once, but fluidly, whenever they need it, so that the lifeblood of digital transformation—data—is available to drive business change in every way possible.

https://bit.ly/3sG7bzt

Active Directory Security Assessment

Gotham has developed an Active Directory Security Risk Assessment offering to provide specific actionable guidance to mitigate security risks in your Active Directory environment.

https://bit.ly/3u8dfRK

Thursday 4/1

CISA and NSA: The Times, They Are A-Changin.’ Identity is Everything Now (CyberArk)

But one thing everyone can agree on is that traditional security approaches – which have failed to change with the digital times – are in dire need of an overhaul.

https://bit.ly/31yoW7Q

Back in a Bit: Attacker Use of the Windows Background Intelligent Transfer Service (FireEye)

When malicious applications create BITS jobs, files are downloaded or uploaded in the context of the service host process. This can be useful for evading firewalls that may block malicious or unknown processes, and it helps to obscure which application requested the transfer.

https://bit.ly/3u5lBcS

The Ransomware Threat: Bigger, Greedier, Attacking the Most Vulnerable (Palo Alto Networks)

Using data from Unit 42, as well as from our Crypsis incident response team, the report details a disturbing new watershed: Cyber extortion has reached crisis levels as cybercriminal enterprises have flourished.

https://bit.ly/3fxk0Zp

Friday 4/2

Vulnerability Roundup: 10 Critical CVEs of 2020 (CrowdStrike)

One lesson from 2020 is clear: Patching security holes must be a high priority for security operations teams throughout this year and beyond. While the newest vulnerabilities often get the most media attention, attackers frequently look for low-hanging fruit such as older, easier-to-exploit vulnerabilities that exist in widely used systems and applications.

https://bit.ly/3dx9Wg8

State of Application Strategy: Evaluating Seven Years of IT Priorities (F5)

Every year the top application security and delivery technologies planned for deployment indicate the strategic priorities of the coming year and how organizations are progressing through digital transformation.

https://bit.ly/2PsSdi2