This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On August 06, 2021

Monday 7/19

Respond to Business Challenges with Agile Storage (Pure Storage)

Unexpected events are inevitable. With agile data storage, you can stay modern while responding to your business needs in an economical way.

Check Point Software showcases new offerings, integrations, and tools at Microsoft Inspire 2021

The decades-long partnership between Microsoft and Check Point Software Technologies is not only a strong building block for our companies, it’s also a great tool for Microsoft partners. If your organization is attending Microsoft Inspire 2021, make sure you visit the Check Point virtual booth to leverage this partnership to expand your Azure opportunities.

Tuesday 7/20

Citrix on Microsoft Azure: Accelerating cloud transition with new innovations

Citrix and Microsoft engineers have been hard at work on key challenges to enhance cloud scale and performance. We’re excited to bring Provisioning Services (PVS), a core Citrix image management technology, to Azure.

Protecting Against Evolving Ransomware Attack Trends (Fortinet)

Considering the impact these modern attacks can have on organizations everywhere, no matter the industry, security professionals must always be ready to secure their systems, networks, and software in new ways.

Wednesday 7/21

The Top Cyberattacks of June 2021 (Arctic Wolf)

May 2021 raised the bar for high-profile cyberattacks, and July seems poised to set the bar even higher. In that context, June’s slate of data breaches and security lapses isn’t quite so dramatic.

Adapting Information Protection to a Changing World (Proofpoint)

Data security has been a primary area of concern for most organizations throughout the COVID-19 pandemic. And while many businesses were already well on their way to the cloud before 2020, the pandemic and all its disruption have certainly helped to accelerate that move.

Monday 7/26

Reduce the Risk from Digital Transformation (Pure Storage)

FlashStack is the industry’s fastest-growing modern data infrastructure, while FlashStack as-a-Service provides the modern economic model for infrastructure consumption. Together, they deliver a powerful, flexible, and future-proof solution for IT infrastructure.

Last Week in Ransomware: Week of July 19th (Varonis)

This past week hasn’t seen quite as much activity as others, likely due to the new ransomware task force created in the US and the mysterious disappearance of REvil and other gangs.

Tuesday 7/27

ICYMI: Gotham CEO Ken Phelan held a chat with Charles Blauner, President of Cyber Aegis, where they discussed zero trust, lateral movement, and ransomware, among other things over breakfast.

Take a strategic approach to empowering a secure hybrid workforce with SASE (Citrix)

SASE is all about enabling a simple and secure access experience for your hybrid workforce while reducing cost and complexity and requiring less effort to manage the environment.

Fortinet Selected as 2020 Google Cloud Technology Partner of the Year for Security

While we are thrilled by what Fortinet and Google Cloud have accomplished together to earn Fortinet the 2020 Google Cloud Partner of the Year for Security, we are even more thrilled about future possibilities as we continue to collaborate, innovate, and envision the future of cloud.

Wednesday 7/28

FACT SHEET: Biden-Harris Administration Marks Anniversary of Americans with Disabilities Act and Announces Resources to Support Individuals with Long COVID

On the 31st anniversary of the Americans with Disabilities Act, the Biden-Harris administration has announced their intent to allocate resources to support those with Long COVID.

Most Missing Insights are Due to Data Bias (F5)

Data bias is caused by opinionated curation within a system. Opinionated curation is the result of decisions made regarding everything from what data is collected and from what systems, to how visualizations are displayed on dashboards.

Securing External Shared File Access in M365

One of the benefits of Microsoft 365 is the ability for users to collaborate and share with co-workers, clients, vendors, partners, and people external to the organization. This benefit, however, comes with a downside; users can either purposely or inadvertently expose information that the organization would not want shared externally.

Thursday 7/29

Cybersecurity Tips From Unit 42 to Help Stop Ransomware Attacks (Palo Alto Networks)

In 2016, the majority of ransoms paid were $500 or less. We now regularly see ransom payments that are more than 10,000 times that level. Palo Alto Networks consultants have seen average payments increase to more than $500,000. We’ve even seen some payments above $10 million.

Memory Forensics for Incident Response (Varonis)

When responding to a cybersecurity incident I’ve always found memory forensics to be a great skill to have. By capturing the memory of a compromised device you can quickly perform some analysis to identify potential malware and gather IOC’s which can then be used to identify other compromised devices.

Tuesday 8/3

4 Risk-Based Steps for Securing Developers and Code (CyberArk)

Cyber criminals have taken note that some of the easiest targets are developers with access rights that allow them to configure a wide range of systems to provision applications — but without the greatest appreciation for security.

Pen Test Series 1: Why to Consider a Pen Test (Arctic Wolf)

Because a pen test demonstrates how an attacker could actually compromise a business’s system, it can set a realistic and effective defense agenda.

Wednesday 8/4

Tips for Good Cyber Hygiene During Hybrid Work (Fortinet)

Securing information online while working or learning across multiple devices as well as while on the go more frequently will not be the same as it was pre-pandemic. It is a good time to review some fundamentals. Here are some tips for good cyber hygiene.

What is Threat Modeling and How To Choose the Right Framework (Varonis)

Threat modeling helps organizations proactively prepare against scenarios that would put them in a compromised place. Common scenarios include when an organization falls prey to a malicious attack such as phishing, ransomware, or MitM attack.

Thursday 8/5

NIST Selects Palo Alto Networks for Zero Trust Architecture Project

Palo Alto Networks is honored to be selected as a collaborator and work with the National Institute of Standards and Technology’s (NIST) National Cybersecurity Center of Excellence (NCCoE) on the newly launched Implementing a Zero Trust Architecture project.

What we have learned about remote work … so far (Citrix)

The market has changed, and organizations need to change, too. What was once a mobile-access strategy that was a temporary and occasional need became a work-from-anywhere strategy that is permanent and that employees want.

Friday 8/6

A Former Hacker Explains How to Fight Ransomware (Pure Storage)

Knowledge is power. And in the war on the multibillion-dollar ransomware industry, knowing what the bad guys have up their sleeves is priceless. What if you could get intel on ransomware attacks straight from a former hacker? Now you can.

Protect Hybrid Data Centers and Prevent Ransomware with FortiGate 3500F NGFW (Fortinet)

Organizations worldwide saw a 700% increase in ransomware attacks over the past year. And ransom demands continue to increase, with one recent high-profile victim paying $5 million to recover their data.