This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On February 18, 2022

Monday 2/14

Identify and Investigate Business Email Compromise (BEC) Scams (Varonis)

According to the FBI's recent IC3 report, Business Email Compromise was responsible for causing over $1.8 billion worth of losses to businesses in 2020, which greatly exceeds the losses attributed to other more publicized forms of cybercrime like ransomware ($29 million).

https://bit.ly/350pUPy

Cyber Operational Collaboration Is Key for the “Next Log4j” Response (Palo Alto Networks)

A quick glance at cybersecurity headlines provides reinforcement why all of this matters. The threat landscape that I spend every day analyzing demands maximum vigilance.

https://bit.ly/3I4Kxc1

Tuesday 2/15

How to Combat Complexity and Elevate Modern App Security (F5)

The modern application landscape continues to evolve into a world of multi-cloud, microservices, and APIs coexisting with legacy, data center-based apps. Security practices are far more challenging because of process complications and increased time pressures on app development.

https://bit.ly/3uO2BD9

The Need for a Zero Trust Edge Strategy (Fortinet)

Fortinet’s innovative approach to Zero Trust Edge converges enterprise-class security and networking everywhere across the network. This unique ability ensures secure access to critical applications and resources, whether users are on-premises or accessing resources through the cloud.

https://bit.ly/3BqKgh0

Wednesday 2/16

Chrome Zero-Day Under Active Attack: Patch ASAP

Google described the weakness, tracked as CVE-2022-0609, as a use-after-free vulnerability in Chrome’s Animation component. This kind of flaw can lead to all sorts of misery, ranging from the corruption of valid data to the execution of arbitrary code on vulnerable systems. Such flaws can also be used to escape the browser’s security sandbox.

https://bit.ly/3JyriI4

Protect your apps from nefarious attacks with Citrix ADC

The IPRep feature is available for the Premium ADC licenses and standalone Citrix Web App Firewall licenses. It can be leveraged with either a Responder Policy or attached to a Web App Firewall profile to drop traffic from known malicious IP ranges and exploits.

https://bit.ly/3Ju0qZC

Thursday 2/17

What are Data Retention and Deletion Policies? (Pure Storage)

Data retention and deletion schedules address what happens to data after it’s been used, dictating how long data can be stored and how it’s disposed of. Even if you’re not misusing the data and it’s properly secured, retaining it beyond the cut-off date counts as an infraction .

https://bit.ly/3JEeuzZ

Nutanix Launches ‘Core-Based’ Pricing Model And Metering

Nutanix is changing the way it sells its software portfolio by now enabling core-based pricing and metering, while also streamlining its 15 different products and brands into just five offerings.

https://bit.ly/33rtYro

Friday 2/18

F5 Transforms Volterra, Shape Security Buys Into Secure Edge Service, Distributed Cloud Platform

F5 rolled out a new platform and service that combines its recent Volterra and Shape Security buys with its own technology to help partners and businesses handle application delivery and security.

https://bit.ly/3gXROOE

Microsoft aims to improve anti-phishing MFA for White House 'zero trust' push

Microsoft plans to make it easier for organizations using Azure Active Directory to enforce multi-factor authentication for users from external organizations.

https://zd.net/3sUnvOF