This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On January 28, 2022

Monday 1/17

Threat Update 71 – Security Predictions for 2022 (Varonis)

2021 was a challenging year for security professionals – the attacks and vulnerabilities seemed bigger and occurred more frequently.

https://bit.ly/3fzpEc2

DHL Replaces Microsoft as Most Imitated Brand in Phishing Attempts in Q4 2021 (Check Point)

In Q4, global logistics and distribution company DHL ended Microsoft’s long-standing reign as the brand most frequently imitated by cybercriminals in attempts to steal credentials or deploy malware via sophisticated phishing techniques.

https://bit.ly/3qyW78I

Tuesday 1/18

Considering a Career in Cybersecurity? Don’t Let Misconceptions Hold You Back (Fortinet)

If you have a curious nature and passion for problem solving, this may be the path for you too. The field is vast and offers countless opportunities for people from all backgrounds and with researchers predicting more job openings than qualified applicants, now is the perfect time to begin your own journey in cybersecurity.

https://bit.ly/3fBFOSo

Prisma Access Joins the Microsoft 365 Networking Partner Program (Palo Alto Networks)

Built on a high-performance network of over 100 locations worldwide and backed by industry-leading SLAs, Prisma Access enables secure, Zero Trust access without compromising user experience.

https://bit.ly/3fArZ6B

Wednesday 1/19

How to protect yourself against keyloggers (Citrix)

This new reality of work creates significant security challenges for IT teams to manage. One particularly dangerous common cyberthreat is keylogging — but what are keyloggers and how can IT teams provide keylogger protection in the era of BYOD programs and unmanaged devices?

https://bit.ly/356rPlx

The Need for the Evolution of Operations (F5)

The disruption caused by the first wave of the Internet as organizations raced to “get online” will happen again as organizations push toward operating as a fully digital entity.

https://bit.ly/3tCj3WF

Thursday 1/20

Proofpoint Joins the National Technology Security Coalition as a National Underwriter

The major policy initiatives undertaken by the NTSC include adopting a national breach notification standard, establishing a federal data privacy standard, addressing the cybersecurity talent shortage, protecting critical infrastructure, and strengthening the public-private partnership.

https://bit.ly/3KrC9ok

This new ransomware comes with a small but dangerous payload

White Rabbit ransomware emerged in December 2021 with an attack against a US bank and has since been examined by cybersecurity researchers, who say that the ransomware appears to be connected to FIN8, a financially motivated cyber-criminal gang.

https://zd.net/3FJBefh

Tuesday 1/25

DaaS vs. SaaS vs. PaaS vs. IaaS: Which is right for your business? (Citrix)

Company goals, culture, and line of business are all important considerations when weighing cloud-service options. But first, it’s important to take a closer look at what each of these four services are.

https://bit.ly/3G1uqdk

2022 Security Report: Software Vendors saw 146% Increase in Cyber Attacks in 2021, marking Largest Year-on-Year Growth (Check Point)

From supply chain attacks to ransomware, organizations experienced 50% more weekly cyber attacks than in 2020. Key highlights from the report include the return of Emotet, cracks in the ransomware ecosystem and vulnerabilities in cloud services.

https://bit.ly/3GcSKJr

Wednesday 1/26

Five Cyber Threats to Watch Out for in 2022 (Fortinet)

To prepare for 2022, organizations should certainly make it a priority to harden both Linux and Windows-based systems. And when adopting new technology, organizations should always take a security-first approach; so before adding new connections such as satellite-based connectivity, make sure it's protected.

https://bit.ly/347FzvO

What Every CEO Should Know About Modern Ransomware Attacks (Varonis)

Keeping cybercriminals down is like putting out a fire in a dry forest — you can extinguish one, but flare-ups can happen anywhere, at any time.

https://bit.ly/3r2p39x

Thursday 1/27

What We Can Learn from the Log4j Vulnerability (Pure Storage)

An estimated 3 billion devices run Log4j. Public cloud providers, major software vendors, and private and public sector organizations have all been affected on a massive scale. So what can we learn from this event?

https://bit.ly/3H9qJ6y

Cloud Security Survey: Better Security Drives Better Business Outcomes (Palo Alto Networks)

Organizations that embrace security and automation, as part of that cloud adoption strategy, show a wide number of better business outcomes.

https://bit.ly/3u4dMY4

Friday 1/28

Why You Should Evaluate the Tech Preview of the Citrix Image Portability Service

Citrix Image Portability Service for Citrix Virtual Apps and Desktops (CAVDS)… is a new Citrix Cloud service in tech preview that allows you to migrate images from on-premises resource locations to your subscription in a public cloud, all of which is managed by Citrix.

https://bit.ly/32DhjBg

Keep Cybersecurity Systems from Drifting in 7 Steps (CyberArk)

As ad-hoc updates are made, technology systems can slowly start to move apart — especially when changes aren’t documented consistently — sometimes leading to system failures and costly outages.

https://bit.ly/3rWjUit

OiVaVoii – An Active Malicious Hybrid Cloud Threats Campaign (Proofpoint)

This campaign uses hijacked Office 365 tenants and a sophisticated combination of cleverly-crafted lures, malicious OAuth apps and targeted phishing threats.

https://bit.ly/3o5Zjal