This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On August 06, 2021

Monday 7/19

Respond to Business Challenges with Agile Storage (Pure Storage)

Unexpected events are inevitable. With agile data storage, you can stay modern while responding to your business needs in an economical way.

https://bit.ly/3itfB9o

Check Point Software showcases new offerings, integrations, and tools at Microsoft Inspire 2021

The decades-long partnership between Microsoft and Check Point Software Technologies is not only a strong building block for our companies, it’s also a great tool for Microsoft partners. If your organization is attending Microsoft Inspire 2021, make sure you visit the Check Point virtual booth to leverage this partnership to expand your Azure opportunities.

https://bit.ly/3wQGIQU

Tuesday 7/20

Citrix on Microsoft Azure: Accelerating cloud transition with new innovations

Citrix and Microsoft engineers have been hard at work on key challenges to enhance cloud scale and performance. We’re excited to bring Provisioning Services (PVS), a core Citrix image management technology, to Azure.

https://bit.ly/3eBm0hZ

Protecting Against Evolving Ransomware Attack Trends (Fortinet)

Considering the impact these modern attacks can have on organizations everywhere, no matter the industry, security professionals must always be ready to secure their systems, networks, and software in new ways.

https://bit.ly/3uWvScH

Wednesday 7/21

The Top Cyberattacks of June 2021 (Arctic Wolf)

May 2021 raised the bar for high-profile cyberattacks, and July seems poised to set the bar even higher. In that context, June’s slate of data breaches and security lapses isn’t quite so dramatic.

https://bit.ly/3eFVt38

Adapting Information Protection to a Changing World (Proofpoint)

Data security has been a primary area of concern for most organizations throughout the COVID-19 pandemic. And while many businesses were already well on their way to the cloud before 2020, the pandemic and all its disruption have certainly helped to accelerate that move.

https://bit.ly/3hQdU74

Monday 7/26

Reduce the Risk from Digital Transformation (Pure Storage)

FlashStack is the industry’s fastest-growing modern data infrastructure, while FlashStack as-a-Service provides the modern economic model for infrastructure consumption. Together, they deliver a powerful, flexible, and future-proof solution for IT infrastructure. 

https://bit.ly/3eWs30O

Last Week in Ransomware: Week of July 19th (Varonis)

This past week hasn’t seen quite as much activity as others, likely due to the new ransomware task force created in the US and the mysterious disappearance of REvil and other gangs.

https://bit.ly/3eTjRxZ

Tuesday 7/27

ICYMI: Gotham CEO Ken Phelan held a chat with Charles Blauner, President of Cyber Aegis, where they discussed zero trust, lateral movement, and ransomware, among other things over breakfast.

https://bit.ly/3f3uoa1

Take a strategic approach to empowering a secure hybrid workforce with SASE (Citrix)

SASE is all about enabling a simple and secure access experience for your hybrid workforce while reducing cost and complexity and requiring less effort to manage the environment.

https://bit.ly/3l7g5W1

Fortinet Selected as 2020 Google Cloud Technology Partner of the Year for Security

While we are thrilled by what Fortinet and Google Cloud have accomplished together to earn Fortinet the 2020 Google Cloud Partner of the Year for Security, we are even more thrilled about future possibilities as we continue to collaborate, innovate, and envision the future of cloud.

https://bit.ly/2VbAz4Q

Wednesday 7/28

FACT SHEET: Biden-Harris Administration Marks Anniversary of Americans with Disabilities Act and Announces Resources to Support Individuals with Long COVID

On the 31st anniversary of the Americans with Disabilities Act, the Biden-Harris administration has announced their intent to allocate resources to support those with Long COVID.

https://bit.ly/2UYeerB

Most Missing Insights are Due to Data Bias (F5)

Data bias is caused by opinionated curation within a system. Opinionated curation is the result of decisions made regarding everything from what data is collected and from what systems, to how visualizations are displayed on dashboards.

https://bit.ly/3i95oQT

Securing External Shared File Access in M365

One of the benefits of Microsoft 365 is the ability for users to collaborate and share with co-workers, clients, vendors, partners, and people external to the organization. This benefit, however, comes with a downside; users can either purposely or inadvertently expose information that the organization would not want shared externally.

https://bit.ly/3i95w2P

Thursday 7/29

Cybersecurity Tips From Unit 42 to Help Stop Ransomware Attacks (Palo Alto Networks)

In 2016, the majority of ransoms paid were $500 or less. We now regularly see ransom payments that are more than 10,000 times that level. Palo Alto Networks consultants have seen average payments increase to more than $500,000. We’ve even seen some payments above $10 million.

https://bit.ly/3fbs54Z

Memory Forensics for Incident Response (Varonis)

When responding to a cybersecurity incident I’ve always found memory forensics to be a great skill to have. By capturing the memory of a compromised device you can quickly perform some analysis to identify potential malware and gather IOC’s which can then be used to identify other compromised devices.

https://bit.ly/376sK2W

Tuesday 8/3

4 Risk-Based Steps for Securing Developers and Code (CyberArk)

Cyber criminals have taken note that some of the easiest targets are developers with access rights that allow them to configure a wide range of systems to provision applications — but without the greatest appreciation for security.

https://bit.ly/2VxghCR

Pen Test Series 1: Why to Consider a Pen Test (Arctic Wolf)

Because a pen test demonstrates how an attacker could actually compromise a business’s system, it can set a realistic and effective defense agenda. 

https://bit.ly/2Vjz19l

Wednesday 8/4

Tips for Good Cyber Hygiene During Hybrid Work (Fortinet)

Securing information online while working or learning across multiple devices as well as while on the go more frequently will not be the same as it was pre-pandemic. It is a good time to review some fundamentals. Here are some tips for good cyber hygiene.

https://bit.ly/2VxghCR

What is Threat Modeling and How To Choose the Right Framework (Varonis)

Threat modeling helps organizations proactively prepare against scenarios that would put them in a compromised place. Common scenarios include when an organization falls prey to a malicious attack such as phishing, ransomware, or MitM attack.

https://bit.ly/3jfthFC

Thursday 8/5

NIST Selects Palo Alto Networks for Zero Trust Architecture Project

Palo Alto Networks is honored to be selected as a collaborator and work with the National Institute of Standards and Technology’s (NIST) National Cybersecurity Center of Excellence (NCCoE) on the newly launched Implementing a Zero Trust Architecture project.

https://bit.ly/3jppFRw

What we have learned about remote work … so far (Citrix)

The market has changed, and organizations need to change, too. What was once a mobile-access strategy that was a temporary and occasional need became a work-from-anywhere strategy that is permanent and that employees want.

https://bit.ly/3CgApKx

Friday 8/6

A Former Hacker Explains How to Fight Ransomware (Pure Storage)

Knowledge is power. And in the war on the multibillion-dollar ransomware industry, knowing what the bad guys have up their sleeves is priceless. What if you could get intel on ransomware attacks straight from a former hacker? Now you can.

https://bit.ly/37tEInq

Protect Hybrid Data Centers and Prevent Ransomware with FortiGate 3500F NGFW (Fortinet)

Organizations worldwide saw a 700% increase in ransomware attacks over the past year. And ransom demands continue to increase, with one recent high-profile victim paying $5 million to recover their data.

https://bit.ly/3itRmt4