This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On October 15, 2021

Monday 10/11

Introducing Citrix Secure Private Access

Organizations need to rethink their approach to security, embracing zero trust, and at the same time make it seamless for employees to access apps securely from anywhere, at any time, and from any device.

The Business Benefit of Implementing an ITM Program (Proofpoint)

Whether intentional or not, the risk of an insider threat incident is very real. Yet, the risk level is often minimized until it’s too late. And for most organizations, “too late” can have a significant financial impact on the business.

Tuesday 10/12

Hybrid Work Brings DaaS and Endpoint Risks (CyberArk)

The truth is that even supremely vigilant organizations will face exposure through DaaS and VDI systems, due to the sheer number of new attack surfaces created by a remote workforce using a combination of company-provided and personal devices.

Pure Storage is Positioned as a Leader in the 2021 Gartner® Magic Quadrant™

Pure is positioned as a Leader in the 2021 Gartner Magic Quadrant for Distributed File Systems & Object Storage.

Wednesday 10/13

Ransomware as a Service: Criminal “Entrepreneurs” Evolve Ransomware (Palo Alto Networks)

The operators who run the RaaS develop and provide the actual ransomware to affiliates, usually with monthly fees and agreements, like a perverted version of a media streaming service – delivering new content directly to their subscribers.

Multiple Clouds Versus Multi-Cloud: Making it Easier to Bridge the Gap (F5)

Despite broad adoption of multi-cloud strategies in the enterprise, there remains a dearth of effective solutions that address the many challenges faced by organizations executing on them.

Phishing: A Primer on How to Protect Your Organization (Arctic Wolf)

Fight the Phish! #Cybersecurity Awareness Month week two is focuses on how to incorporate security awareness training to help employees understand the importance of always being alert. #CybersecurityFirst

Thursday 10/14

Considerations for Securing a Work-from-Anywhere World (Fortinet)

Ideally, accessing corporate applications and data from anywhere should be seamless, but remote connectivity often impacts the user experience and security posture. Resolving these issues requires addressing three key IT pain points.

30 Mins or Less: Rapid Attacks Extort Orgs Without Ransomware

The previously unknown SnapMC group exploits unpatched VPNs and webserver apps to breach systems and carry out quick-hit extortion in less time than it takes to order a pizza.

Friday 10/15

Modernize Your SOC with Falcon Fusion, CrowdStrike’s Integrated SOAR Framework (CrowdStrike)

As a cybersecurity company that has built one of the largest cloud architectures in the world, CrowdStrike has gained an exceptional vantage point and garnered unique experience on what it takes to streamline incident response, while delivering unprecedented visibility and context — all in one place.

Top 10 Considerations When Evaluating a Cloud Network Security Solution (Check Point)

Cloud security has become business-critical as organizations expand and deepen their cloud presence. According to the Check Point 2020 Cloud Security Report, 75% of surveyed organizations were either very or extremely concerned about cloud security.