This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On October 25, 2021

Monday 10/18

Introducing the all-new Citrix Workspace Browser!

Citrix Workspace Browser combines the native capabilities of a Chromium-based browser with Citrix Cloud services, providing a state-of-the-art user experience for all enterprise use cases.

#BeCyberSmart! How to Make the Most of Cybersecurity Awareness Month (Proofpoint)

October is Cybersecurity Awareness Month—and it’s an ideal opportunity for your organization to provide safe computing reinforcement to your users. With this reinforcement, they can improve their ability to identify, resist and report threats that can lead to breaches and data loss—and become defenders instead of targets.

Tuesday 10/19

8 Ways to “Fight the Phish” this Cybersecurity Awareness Month (CyberArk)

During this second week of Cybersecurity Awareness Month, pay extra attention to those emails, text messages and chat boxes coming from a stranger or someone you weren’t expecting — and think before you click!

Social Now Among Top Three Sectors to be Imitated in Phishing Attempts in Q3 2021 (Check Point)

Our latest Q3 report also reveals that, for the first time this year, social was among the top three sectors to be imitated in phishing attempts, with WhatsApp, LinkedIn and Facebook all appearing in the top ten list of most imitated brands.

Feds Warn BlackMatter Ransomware Gang is Poised to Strike

Federal authorities are warning businesses to shore up cybersecurity defenses as it carefully monitors the reemergence of the DarkSide ransomware gang, believed responsible for the crippling Colonial Pipeline attack in May 2021.

Wednesday 10/20

What Companies Win and Lose when Moving to a Hybrid Workplace (Lakeside Software)

For organizations, understanding the technology needs of end users and how it affects their productivity becomes more crucial than ever to ensure quality employee experiences, no matter where they are working from.

Demystifying Container Security (Palo Alto Networks)

The uniqueness of container environments creates a number of interesting consequences. By applying the principles of Zero Trust, we can better understand how to approach securing these environments.

Thursday 10/21

Password Spraying: What to Do and Prevention Tips (Varonis)

With password spraying, hackers take common, non-complex passwords and “spray” them across an entire organization, hoping that a single user might be using something like “abc123,” “password,” or any one of the most utilized passwords that are publicly available.

5 Ways to Optimize Your Supply Chain with Analytics (Pure Storage)

For organizations looking for new ways to optimize their supply chain networks, incorporating advanced analytics of unstructured data and other innovations like the Internet of Things (IoT) and IoT edge computing into supply chain operations can help organizations gain in-depth insight into erratic supply and demand trends.

Friday 10/22

Leveling Up Your AWS WAF with F5 Managed Rules

AWS partnered with various security vendors including F5 to offer a variety of Managed Rulesets that can be attached to AWS WAF instances, up-leveling them to mitigate a range of web app and API attack types.

This monster of a phishing campaign is after your passwords

Microsoft says the attackers have been creating malicious AWS WorkMail accounts "at scale" but are just using randomly generated domain names instead of names that would represent a legitimate company.