This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On September 17, 2021

Monday 9/13

So your company just upgraded to Citrix Workspace. Now what?

Citrix Workspace comes with a suite of tools to make your job easier — and your employees’ jobs. Now you can manage web and SaaS apps alongside the Windows apps you’ve been managing within Citrix Virtual Apps and Desktops.

New Application Security Report Outlines the Biggest Challenges for DevSecOps (Fortinet)

For business-critical workflows, organizations look to enable access from any device from anywhere that the user can access an internet connection. As fewer line-of-business applications lack a public facing interface, this easy access helps enhance productivity and reduces operational friction.

Ransomware Readiness Assessment Part 3

A comprehensive plan needs to be developed to cover all of the different cybersecurity controls that need to be installed and the multitude of configuration items that must be set in order for those controls to be successful.

Tuesday 9/14

Zero Trust: Short Answers to Agencies’ Top Questions (Palo Alto Networks)

Organizations can no longer inherently trust whatever is inside their security perimeter. As the perimeter has evolved and IT environments have become far more complex, organizations must continually authenticate, authorize and verify who and what can access an environment to grant “least privilege” access.

Microsoft Finds Attack Attempts With Office Files

The vulnerability allows attackers to make a malicious ActiveX control used by an Office document that hosts the browser rendering engine, according to the report. Users who open the document risk exposure.

Wednesday 9/15

Securing Smart Devices in OT Environments (Fortinet)

The reality is that an attack on IIoT, especially on a device or system used to monitor critical operations and processes can have a very significant impact on not only the business itself but also on the environment, even on the health and safety of staff and the public at large.

How to Implement People-Centric DLP for Office 365 (Proofpoint)

Organizations that use the Office 365 platform also have legitimate concerns around data security and compliance. IT managers can address these concerns by implementing and maintaining a comprehensive cloud Data Loss Prevention (DLP) solution.

Thursday 9/16

Check Point Cloud Security Wins High Praise as Leader in G2 Reviews

Whether deploying workloads in public cloud, private cloud, or environments relying on Network Function Virtualization (NFV), customers have consistently rated Check Point CloudGuard solutions in the G2 Leader quadrants for Cloud Data Security.

Attackers Impersonate DoT in Two-Day Phishing Scam

Threat actors impersonated the U.S. Department of Transportation (USDOT) in a two-day phishing campaign that used a combination of tactics – including creating new domains that mimic federal sites so as to appear to be legitimate – to evade security detections.

Help, my storage is running out of space because of FSLogix!

Users’ profiles grow organically over time as they use VDI. If an IT administrator doesn’t monitor and perform regular maintenance on the profile shares, they can run out of space. When this happens, users are unable to log on and active profiles start to become corrupted.

Friday 9/17

Microsoft just took another big step towards getting rid of passwords forever

Microsoft is extending its passwordless sign-in option from enterprise customers that use Azure Active Directory (AAD) to consumer Microsoft accounts on Windows 10 and Windows 11 PCs.

5 Ways to Address Data Security Gaps Before an Attack (Pure Storage)

Although it’s not possible to guard against every known security threat, knowing the common vulnerabilities that cause ransomware attacks can help you create the right plan to minimize your risks before an attack occurs.

Why Building a Security Culture at Your Company Matters and How to Start (Proofpoint)

Addressing the people aspect of cybersecurity is more critical than ever given today’s threat landscape. Attackers continue to target people and commonly use social engineering as part of their attacks. Ransomware attacks often require a person to download a malicious attachment or give up their credentials to gain initial access to your organization.