This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On January 07, 2022

Monday 12/20

How to drive innovation and productivity for your distributed workforce (Citrix)

Delivering a secure and productive hybrid-work experience that drives innovation everywhere is one reason Citrix created Citrix Workspace. To make it simpler than ever to support hybrid-work innovation and collaboration, Citrix Workspace empowers distributed workforces with a unified and streamlined work experience.

Brute Force Attack: Definition, Types, and Prevention (Varonis)

While there are easy and common ways to defend against brute force attacks, it’s a low-effort attack on the part of hackers, making it easy to find a vulnerability within a company’s site.

Tuesday 12/21

Arctic Wolf Releases Open Source Log4Shell Detection Script

After successful deployment to Arctic Wolf’s customer community of more than 2,300 organizations worldwide, today we are making “Log4Shell Deep Scan” publicly available on GitHub. Log4Shell Deep Scan enables detection of both CVE-2021-45046 and CVE-2021-44228 within nested JAR files, as well as WAR and EAR files.

The 7 Deadly Privileged Accounts You MUST Discover, Manage, and Secure (Thycotic)

Not only are most businesses dependent on privileged accounts, but they are also the accounts most likely to be targeted by cyber criminals or abused by malicious insiders. This is because they allow the attackers to easily move around the network, accessing critical systems and sensitive data while remaining undetected and cleverly hiding their tracks.

Wednesday 12/22

CrowdXDR Alliance Expands to Help Security Teams Identify and Hunt Threats Faster (CrowdStrike)

The addition of these partners provides customers with powerful and relevant insights using data sources across network, cloud and IoT solutions.

GDPR: Approaches for Protecting Personally Identifiable Information (PII) and Sensitive Personal Information (SPI) (Proofpoint)

These two categories of personal information are very different from each other and require separate approaches to accurately identify and protect them as they flow through an organization’s data environment.

Tuesday 1/4

Workforce Trends to Watch in 2022: What Attackers Want from Collaboration Apps (CyberArk)

For IT and security leaders, it’s a good time to think about ways to update access management strategies to reflect the ever-changing workforce.

Choose Your Own Compromise: Attackers Use Similar Lures to Deliver Both Smishing and Malware Attacks (Proofpoint)

Mobile malware and SMS phishing, or “smishing,” lures have converged during the pandemic, as cyber criminals piggyback on the surge in online shopping and package delivery.

Wednesday 1/5

Resolutions for remote and hybrid leaders (Citrix)

In a digital and distributed workplace, it’s easy to become hyper transactional. With these resolutions, I hope to stay connected with the humans behind the 1s and 0s. It’s the people, not the emails, who make our business succeed.

Building the Zero Trust Enterprise: A Holistic Approach (Palo Alto Networks)

Organizations can evolve into a Zero Trust enterprise by taking a holistic approach and applying Zero Trust best practices comprehensively across users, applications and infrastructure.

Thursday 1/6

SSD vs. HDD Speeds: What’s the Difference? (Pure Storage)

Currently, you have two storage device options: a solid-state drive (SSD) or a hard-disk drive (HDD). Both types of storage are built and engineered differently, and they offer different benefits. SSD devices are faster, but they also cost more. HDD devices are slower, but they have a large storage capacity.

Don’t Bring a Legacy Mindset to Multi-Cloud (F5)

As organizations are increasingly adopting multiple clouds and mutli-cloud, it’s important to ask what other aspects also need to change in the apps and operations realm.

Friday 1/7

Weaponizing the Edge with Cyber Threats (Fortinet)

Although end-users and their home resources are already targets for cybercriminals, sophisticated attackers can use home-based resources as a springboard for other more serious attacks.

Repurposing Thin Clients (IGEL)

When it comes to thin clients, repurposing allows you to use them for a vast range of business workloads.