This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On June 18, 2021

Monday 6/14

Return of the Darkside: Analysis of a Large-Scale Data Theft Campaign (Varonis)

The Darkside ransomware group announced their RaaS (Ransomware-as-a-Service) in August of 2020 via a “press release.” Since then, they have become known for their professional operations and large ransoms.

https://bit.ly/2TZsyzf

DataOps: Optimizing the Data Experience (Pure Storage)

As organizations embark on digital transformation initiatives, they need to identify business processes and related services that will perform better and be more consumable on a digital platform. Maintaining the information model and data model—and keeping them as optimized as possible—becomes paramount.

https://bit.ly/2SyvRwX

A Mystery Malware Stole 26 Million Passwords From Windows PCs

Researchers have discovered yet another massive trove of sensitive data, a dizzying 1.2 TB database containing login credentials, browser cookies, autofill data, and payment information extracted by malware that has yet to be identified.

https://bit.ly/3cCOneI

Tuesday 6/15

Citrix recognized as a top DaaS solution by key IT media outlets

Citrix is proud to share that Citrix Virtual Apps and Desktops has been named the top-rated leader in desktops as a service (DaaS) solutions by three top IT media publications: IT Central Station, G2, and TechGenix.

https://bit.ly/3iD7wkq

Least Privilege in The Cloud (and Everywhere Else) (CyberArk)

In this era of security uncertainty, organizations are revisiting foundational practices like least privilege — when identities have their privileges and permissions restricted to bare minimum access — to mitigate risk and defend their growing cloud estates.

https://bit.ly/3iN0x8v

Wednesday 6/16

New CSPM Functionality Frees Teams from Alert Noise and Blind Spots (Palo Alto Networks)

By correlating multiple data points, including routing table configurations, Prisma Cloud is able to determine true network reachability, and then surface high fidelity alerts. This frees security teams from sifting through alert "noise" such as false exposure, so they can focus on more impactful security issues.

https://bit.ly/3iHXKgU

Navigating the Threat Landscape As Social Engineering Lures Change (Fortinet)

Now, as we once again shift work models in many countries, it is paramount to reconsider how these threats will affect the transition and how organizations can secure their networks.

https://bit.ly/3gsJarW

Thursday 6/17

Check Point Software is Cloud Security!

With the cloud native applications covered with our AppSec solution, this quarter we are announcing our unified solution for cloud workload protection. This is a solution which protects all applications, all APIs and every microservice that powers the application; containers, serverless functions and VMs.

https://bit.ly/3gALXQa

Coffee Chat with Gotham & Arctic Wolf on June 22nd @ 9AM.

Arctic Wolf just released a new Managed Security Awareness offering and will be discussing how this can help ensure employees are regularly informed about threats and how to stop them at the point of attack.

https://bit.ly/3cL0Qg7

Exclusive Ransomware Poll: 80% of Victims Don’t Pay Up

As ransomware attacks continue to grow in volume and sophistication – and not to mention profile, thanks to attacks like the one on Colonial Pipeline – organizations are becoming more aware of the risk. However, strategies for addressing ransomware turn out to be quite varied.

https://bit.ly/3gzYfby

Friday 6/18

Announcing Proofpoint Information and Cloud Security Platform – Enabling DLP and SASE Use Cases

Together with Proofpoint SaaS Isolation, CASB Proxy provides granular access controls such as read-only access and real-time DLP for both approved and tolerated apps.

https://bit.ly/3vD33ky

Characteristics of a Good Next-Generation Firewall (NGFW) (Check Point)

Today’s firewalls are multi-purpose network devices and key to any network; large or small, enterprise or small business, on-premises or virtual. In a properly segmented network, firewalls enforce zero trust least privileged access for users, groups, applications, systems and IoT devices.

https://bit.ly/3cRtagY

Faux ‘DarkSide’ Gang Takes Aim at Global Energy, Food Sectors

Threat actors are taking advantage of the notoriety around the pipeline ransomware incident and the DarkSide name, in order to mount a fear-based social-engineering campaign.

https://bit.ly/3xwDjYp