This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On November 19, 2021

Monday 11/15

5 Key E-Commerce Holiday Shopping Cyberattacks to Secure, Defend, and Protect Against (F5)

Over 1 million stolen credentials are reported every day, and underground markets have industrialised cyber crimes and fraudulent activities. Automation, malicious bots, and manual attacks expose users and businesses to fraud, which led to a 65% increase in successful fraud attempts from 2019 to 2020.

Tracking Upward and Innovating for our Customers—Together (Okta)

Okta was named a Leader by Gartner® in the fifth edition of its Magic Quadrant™ for Access Management report, positioned highest on the Ability to Execute axis.

Tuesday 11/16

5 Steps to Reduce Your Data Storage Headaches (Pure Storage)

When managing critical business data, complex workloads, and distributed environments, here are five ways to reduce the headaches associated with data storage.

When ‘Good Enough’ Security Just Isn’t Enough (Check Point)

Generally, security vendors should develop secure products overall and show seriousness in both amount of security vulnerabilities they have in addition to the time it takes to patch, regardless of severity.

Wednesday 11/17

Citrix TIPs: User profiles using FSLogix and high availability mechanisms

We’re seeing more customers adopt FSLogix to take advantage of profile containerization when using the O365 suite. FSLogix is a Microsoft tool available to customers with the required licensing.

Emotet, once the world's most dangerous malware, is back

Researchers from a number of cybersecurity companies have warned that Emotet has returned. Another malware botnet, TrickBot – which became the go-to for many cyber criminals following the January takedown – is being used to install Emotet on infected Windows systems.

Thursday 11/18

Data Mobility for HPC and EDA Workloads from On-premises to Azure Cloud (Pure Storage)

Protecting IP is paramount in chip design and manufacturing. See how you can mitigate security risks while benefiting from seamless data mobility with a connected cloud.

What is Role-Based Access Control (RBAC)? (Varonis)

As more data and systems come online every year a more effective, quicker to implement, and easier way to manage access is needed which is where Role-Based Access Control (RBAC) comes into the picture.

Friday 11/19

Lessons Learned from Some of the Latest and Biggest Data Breaches Involving Insiders (Proofpoint)

Not all insiders responsible for data loss or compromise are malicious in their intent, driven by greed or the desire to wreak havoc as a saboteur. Many insiders are employees who simply make data security missteps that lead to costly and reputation-damaging data leaks for their organization.

What is SASE and How Does it Relate to Zero Trust? (CyberArk)

SASE makes it easier to enforce Zero Trust and consistently apply role-based, identity-centric controls and granular policies for data movement across the entire network.