This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On February 04, 2022

Monday 1/31

CISA Releases Incident And Vulnerability Response Playbooks To Strengthen Cybersecurity For Federal Civilian Agencies

“The playbooks we are releasing today are intended to improve and standardize the approaches used by federal agencies to identify, remediate, and recover from vulnerabilities and incidents affecting their systems,” said Matt Hartman, Deputy Executive Assistant Director for Cybersecurity.

https://bit.ly/343VLyw

Hybrid work is here to stay, and that’s a good thing (Citrix)

Flexible models and workforce strategies have opened the door to greater innovation and business growth, and companies that embrace them can knock it down.

https://bit.ly/3Ggp7qg

Tuesday 2/1

Reflections on Security: Looking Ahead (Okta)

As technology keeps advancing, we keep optimizing, improving, and retiring legacy systems and processes. But as we’ve learned, the bad actors are just as innovative. They’ll evolve their efforts, as needed, to compromise our infrastructure and capitalize on deprioritized systems.

https://bit.ly/35G3R0N

Make Work from Anywhere a Reality with ZTNA (Fortinet)

Zero-trust network access (ZTNA) can make work-from-anywhere a reality because it provides the same security no matter where someone is located, and it reduces the attack surface by hiding applications from the internet behind a proxy point.

https://bit.ly/3494sHR

Citrix To Be Acquired, Taken Private And Merged With Tibco In $16.5B Deal

Once the acquisition is complete, Citrix will become a private company, will continue to operate under the Citrix name and brand, and will remain based in Fort Lauderdale, Fla.

https://bit.ly/3sbf7cS

Wednesday 2/2

6 Ways Big Data Analytics Can Drive Down Costs (Pure Storage)

Companies depend on data to respond to evolving needs, improve customer relationships, and reduce the risks that threaten business operations. Through big data analytics, organizations can predict emerging trends and discover valuable insights that help them make strategic decisions.

https://bit.ly/3L3d6Iq

The 2022 Workforce Security Report (Check Point)

Whether it is a hybrid work model or a completely remote one, WFH is clearly not a passing trend for organizations. This new normal begs the questions – how are organizations protecting their ever-growing attack surface? How are they keeping their remote workforce secure?

https://bit.ly/3Hn0LfX

Thursday 2/3

Palo Alto Networks Recognized in Critical Capabilities Report

Our industry-first VM-Series virtual firewalls provide enterprise-grade security, including our Cloud-Delivered Security Services and feature-rich integration with service providers like AWS, Azure, GCP and Oracle.

https://bit.ly/3AV3TgM

PowerPoint Files Abused to Take Over Computers

Attackers are using socially engineered emails with .ppam file attachments that hide malware that can rewrite Windows registry settings on targeted machines.

https://bit.ly/3se5pGP

Friday 2/4

MFA PSA, Oh My! (Proofpoint)

Threat actors are using phish kits that leverage transparent reverse proxy, which enables them to man-in-the-middle (MitM) a browser session and steal credentials and session cookies in real-time. 

https://bit.ly/3IXHRwC

At U.S. Federal Agencies, the Time is Right for Zero Trust (F5)

The accelerated use of the Zero Trust model, both at federal agencies and the business world at large, coincides with the growing realization that traditional methods to secure a network’s perimeter are no longer sufficient.

https://bit.ly/35P9Lg9