This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On June 11, 2021

Monday 6/7

Streaming Live Data is the Heart of Observability (CrowdStrike)

For security, much of the power of Humio comes from its ability to ingest live streaming data and make it immediately available to update alerts, visualizations, and perform queries. This is the backbone for achieving complete observability and making an environment more secure.

https://bit.ly/3zavYiM

Pure Storage: A Leader in the GigaOm Radar for High-Performance Object Storage

Pure Storage was not only named as a leader in the report. It’s also one of just four leaders in the innovation hemisphere and one of only three outperformers overall.

https://bit.ly/3zaYoco

The cost of ransomware attacks worldwide will go beyond $265 billion in the next decade

Currently, the cybersecurity agency estimates that ransomware will cost us approximately $20 billion this year, a 57x jump from 2015.

https://zd.net/2SeVz9L

Tuesday 6/8

Unit 42 Discovers First Known Malware Targeting Windows Containers (Palo Alto Networks)

Siloscape targets Windows containers and opens up a backdoor to a Kubernetes cluster. This then gives an attacker access to run any code, anywhere in the victim’s cluster.

https://bit.ly/3z8VTHH

Examining Top IoT Security Threats and Attack Vectors (Fortinet)

The IoT landscape includes a host of network-connected devices, including cell phones, smartwatches, smart locks and appliances, cameras, and industrial equipment and sensors. The entire IoT attack surface is the sum total of the security risk eposure from these devices and the larger network ecosystem and infrastructure they are embedded within.

https://bit.ly/3pxfJI6

Wednesday 6/9

When It Comes to Security Validation, BAS Is Not Enough (FireEye)

Security Validation and BAS technologies have many perceived similarities, but despite claims of comparable functionality, the distinction remains clear: simulation and yesterday’s data are no match for emulation using real-time threat intelligence.

https://bit.ly/3zdi3Zs

Application Edge Integration: A Study in Evolution (F5)

As applications have advanced and become tightly integrated into our everyday routines, the need to improve the customer’s application experience continues to drive a need to reduce latency and provide additional bandwidth.

https://bit.ly/3gnhqny

Thursday 6/10

Citrix TIPs: Redirecting traffic to Citrix Secure Internet Access service

Cloud-delivered security is one of the key changes enterprise networking and security teams need to make for a fast, consistent, and secure experience for end users.

https://bit.ly/3vbQqwo

What is Privileged Access Management (PAM) and Why It’s Important to Your Organization (Varonis)

PAM is implemented by a mix of software, defined processes, and enforcement that limits only those with privileged access from reaching your most critical data and assets. It’s also a way to monitor users who have elevated access to ensure your assets and data are kept safe.

https://bit.ly/3g8ojdi

Microsoft Unveils Azure Virtual Desktop As New Name For WVD, Adds Management Features

Microsoft has rebranded its virtual desktop infrastructure platform under the Azure name and announced new security and management capabilities under preview.

https://bit.ly/3gpDFsN

Friday 6/11

June 2021 Patch Tuesday: Six Actively Exploited Zero-Day Vulnerabilities and More Critical CVEs (CrowdStrike)

This month’s patch update covers 50 actively exploited vulnerabilities, the highest number we’ve seen so far in 2021. Five of these in-the-wild exploits affect default Windows components, and one is a zero-day targeting MSHTML.

https://bit.ly/2SiBKhX

Join Varonis and Gotham on Tuesday, June 15 at 1:00 PM for a fun and informative virtual golf lesson to improve your short game with Pat Bigelow from Pure Drive Golf. See the link below for registration details.

https://varonisgothamshortgame.splashthat.com/

Monday 6/7

Streaming Live Data is the Heart of Observability (CrowdStrike)

For security, much of the power of Humio comes from its ability to ingest live streaming data and make it immediately available to update alerts, visualizations, and perform queries. This is the backbone for achieving complete observability and making an environment more secure.

https://bit.ly/3zavYiM

Pure Storage: A Leader in the GigaOm Radar for High-Performance Object Storage

Pure Storage was not only named as a leader in the report. It’s also one of just four leaders in the innovation hemisphere and one of only three outperformers overall.

https://bit.ly/3zaYoco

The cost of ransomware attacks worldwide will go beyond $265 billion in the next decade

Currently, the cybersecurity agency estimates that ransomware will cost us approximately $20 billion this year, a 57x jump from 2015.

https://zd.net/2SeVz9L

Tuesday 6/8

Unit 42 Discovers First Known Malware Targeting Windows Containers (Palo Alto Networks)

Siloscape targets Windows containers and opens up a backdoor to a Kubernetes cluster. This then gives an attacker access to run any code, anywhere in the victim’s cluster.

https://bit.ly/3z8VTHH

Examining Top IoT Security Threats and Attack Vectors (Fortinet)

The IoT landscape includes a host of network-connected devices, including cell phones, smartwatches, smart locks and appliances, cameras, and industrial equipment and sensors. The entire IoT attack surface is the sum total of the security risk eposure from these devices and the larger network ecosystem and infrastructure they are embedded within.

https://bit.ly/3pxfJI6

Wednesday 6/9

When It Comes to Security Validation, BAS Is Not Enough (FireEye)

Security Validation and BAS technologies have many perceived similarities, but despite claims of comparable functionality, the distinction remains clear: simulation and yesterday’s data are no match for emulation using real-time threat intelligence.

https://bit.ly/3zdi3Zs

Application Edge Integration: A Study in Evolution (F5)

As applications have advanced and become tightly integrated into our everyday routines, the need to improve the customer’s application experience continues to drive a need to reduce latency and provide additional bandwidth.

https://bit.ly/3gnhqny

Thursday 6/10

Citrix TIPs: Redirecting traffic to Citrix Secure Internet Access service

Cloud-delivered security is one of the key changes enterprise networking and security teams need to make for a fast, consistent, and secure experience for end users.

https://bit.ly/3vbQqwo

What is Privileged Access Management (PAM) and Why It’s Important to Your Organization (Varonis)

PAM is implemented by a mix of software, defined processes, and enforcement that limits only those with privileged access from reaching your most critical data and assets. It’s also a way to monitor users who have elevated access to ensure your assets and data are kept safe.

https://bit.ly/3g8ojdi

Microsoft Unveils Azure Virtual Desktop As New Name For WVD, Adds Management Features

Microsoft has rebranded its virtual desktop infrastructure platform under the Azure name and announced new security and management capabilities under preview.

https://bit.ly/3gpDFsN

Friday 6/11

June 2021 Patch Tuesday: Six Actively Exploited Zero-Day Vulnerabilities and More Critical CVEs (CrowdStrike)

This month’s patch update covers 50 actively exploited vulnerabilities, the highest number we’ve seen so far in 2021. Five of these in-the-wild exploits affect default Windows components, and one is a zero-day targeting MSHTML.

https://bit.ly/2SiBKhX

Join Varonis and Gotham on Tuesday, June 15 at 1:00 PM for a fun and informative virtual golf lesson to improve your short game with Pat Bigelow from Pure Drive Golf. See the link below for registration details.

https://varonisgothamshortgame.splashthat.com/

Cloud Security 2021: Latest Trends and Insights (Fortinet)

The brand new 2021 Cloud Security Report reveals how more than 500 cybersecurity professionals —from technical executives to managers and IT security practitioners — are responding to security threats in the cloud, how their organizations are using cloud, and the best practices they are prioritizing.

https://bit.ly/3xf31k5