Monday 2/14
Identify and Investigate Business Email Compromise (BEC) Scams (Varonis)
According to the FBI's recent IC3 report, Business Email Compromise was responsible for causing over $1.8 billion worth of losses to businesses in 2020, which greatly exceeds the losses attributed to other more publicized forms of cybercrime like ransomware ($29 million).
https://bit.ly/350pUPy
Cyber Operational Collaboration Is Key for the “Next Log4j” Response (Palo Alto Networks)
A quick glance at cybersecurity headlines provides reinforcement why all of this matters. The threat landscape that I spend every day analyzing demands maximum vigilance.
https://bit.ly/3I4Kxc1
Tuesday 2/15
How to Combat Complexity and Elevate Modern App Security (F5)
The modern application landscape continues to evolve into a world of multi-cloud, microservices, and APIs coexisting with legacy, data center-based apps. Security practices are far more challenging because of process complications and increased time pressures on app development.
https://bit.ly/3uO2BD9
The Need for a Zero Trust Edge Strategy (Fortinet)
Fortinet’s innovative approach to Zero Trust Edge converges enterprise-class security and networking everywhere across the network. This unique ability ensures secure access to critical applications and resources, whether users are on-premises or accessing resources through the cloud.
https://bit.ly/3BqKgh0
Wednesday 2/16
Chrome Zero-Day Under Active Attack: Patch ASAP
Google described the weakness, tracked as CVE-2022-0609, as a use-after-free vulnerability in Chrome’s Animation component. This kind of flaw can lead to all sorts of misery, ranging from the corruption of valid data to the execution of arbitrary code on vulnerable systems. Such flaws can also be used to escape the browser’s security sandbox.
https://bit.ly/3JyriI4
Protect your apps from nefarious attacks with Citrix ADC
The IPRep feature is available for the Premium ADC licenses and standalone Citrix Web App Firewall licenses. It can be leveraged with either a Responder Policy or attached to a Web App Firewall profile to drop traffic from known malicious IP ranges and exploits.
https://bit.ly/3Ju0qZC
Thursday 2/17
What are Data Retention and Deletion Policies? (Pure Storage)
Data retention and deletion schedules address what happens to data after it’s been used, dictating how long data can be stored and how it’s disposed of. Even if you’re not misusing the data and it’s properly secured, retaining it beyond the cut-off date counts as an infraction .
https://bit.ly/3JEeuzZ
Nutanix Launches ‘Core-Based’ Pricing Model And Metering
Nutanix is changing the way it sells its software portfolio by now enabling core-based pricing and metering, while also streamlining its 15 different products and brands into just five offerings.
https://bit.ly/33rtYro
Friday 2/18
F5 Transforms Volterra, Shape Security Buys Into Secure Edge Service, Distributed Cloud Platform
F5 rolled out a new platform and service that combines its recent Volterra and Shape Security buys with its own technology to help partners and businesses handle application delivery and security.
https://bit.ly/3gXROOE
Microsoft aims to improve anti-phishing MFA for White House 'zero trust' push
Microsoft plans to make it easier for organizations using Azure Active Directory to enforce multi-factor authentication for users from external organizations.
https://zd.net/3sUnvOF