This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On March 11, 2022

Monday 3/7

Your Blueprint to Implement an Insider Threat Management Program (Proofpoint)

Organizations need to adopt a new mindset to efficiently adapt to this new normal, one that enables a transformation of their insider threat management strategies. It starts by understanding the insider threat risk.

https://bit.ly/3vH3Jcl

Service Continuity in Citrix Cloud: A recipe for resiliency

Citrix admins can put service continuity to the test and proceed with enabling it in their production environment. If you’re leveraging Citrix Workspace and Citrix Gateway service or Citrix Workspace and internal connections, service continuity will help ensure employees can stay productive, even during outages.

https://bit.ly/3tEw2W6

Tuesday 3/8

Break the Bias and Create a More Diverse and Inclusive Cybersecurity Workforce (Fortinet)

To change this perception and get out ahead of the cybercrime crisis we all face, we must bring more voices, perspectives, and diversity to our cybersecurity teams.

https://bit.ly/3Cr2fEc

How to Put CISA’s “Shields Up” Recommendations Into Action (Pure Storage)

In the face of mounting cyber threats, the Cybersecurity & Infrastructure Security Agency (CISA) has issued guidance for organizations to bolster their cybersecurity defenses.

https://bit.ly/3hQEkEN

Wednesday 3/9

The Case for Building Identity Security into Enterprise UX Design (CyberArk)

If user-centric Identity and Access Management (IAM) protections aren’t integrated tightly into enterprise software design, overall product security and quality will likely suffer.

https://bit.ly/3tH8sYW

Prisma Cloud Supply Chain Security Reduces Code Complexity and Risk (Palo Alto Networks)

With our latest release, Prisma Cloud now provides an automatic inventory and visualization of your cloud native supply chain. This provides quick visibility into the software bill of materials, connections between components and code pipelines that make up your cloud native applications.

https://bit.ly/3HW9EwF

Google To Buy Incident Response Superstar Mandiant For $5.4B

Google believes Mandiant will bring real-time and in-depth threat intelligence gained from working with the largest organizations in the world on the frontlines of cybersecurity.

https://bit.ly/3vMuPPk

Thursday 3/10

Top Cyber Attacks of February 2022 (Arctic Wolf)

The importance of businesses, governments, and other organizations protecting vital systems and sensitive data has never faced such a stark context.

https://bit.ly/3KphIaS

Smartphone malware is on the rise, here's what to watch out for

Cybersecurity researchers warn of a 500% surge in mobile cyberattacks as hackers try to steal passwords, bank details and even take full control of smartphones.

https://zd.net/3vWe5VL

Friday 3/11

CrowdStrike and Cloud Security Alliance Collaborate to Enable Pervasive Zero Trust

Our work with the Cloud Security Alliance and our partners Zscaler and Okta will build on this foundation and accelerate the deployment of comprehensive Zero Trust industry standards that set up customers for success in enforcing a “Trust No One, Verify Always” approach to securing an increasingly complex threat environment.

https://bit.ly/3iho9Rr

Qakbot Botnet Sprouts Fangs, Injects Malware into Email Threads

The ever-shifting, ever-more-powerful malware is now hijacking email threads to download malicious DLLs that inject password-stealing code into webpages, among other foul things.

https://bit.ly/3tRt5BA