This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On April 01, 2022

Monday 3/28

CISA Adds 66 Known Exploited Vulnerabilities to Catalog

CISA has added 66 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

From the Shotgun Approach to Triple Extortion: The Evolving Ransomware Threat (Fortinet)

Although overall ransomware remains a top concern, there are proactive measures organizations of almost any size can, and should take, to minimize the impact of a ransomware incident.

Tuesday 3/29

Join us on Wednesday, April 13, at 9:30 AM, for our next CTO Tech Talk. Gotham's CTO, Ken Phelan, will be joined by Palo Alto Networks’ Prisma Access/SASE Field CTO, Jason Georgi, to discuss SASE and if it's ready for primetime. See the link below for registration details.

Suspicious Login Detection with your Cloud Identity Provider Through Proofpoint CASB (Proofpoint)

The growth of cloud storage, the rise of remote work and greater use of cloud applications for anytime-anywhere workforce collaboration are all helping to increase attackers’ interest in targeting cloud accounts.

Collaboration is Crucial to Combating Cybercrime (Fortinet)

Our goal is not only to prevent attacks, but we also want to dismantle and force cybercriminals to change models, approaches, and techniques, which demands their time, effort, and resources.

Wednesday 3/30

Multi-Cloud Networking for Telcos: No Pain, More Gain (F5)

As apps are increasingly composed of micro-services, we are moving to a world where one app is typically spread across different environments. In other words, apps are becoming both distributed and decomposed.

Why are cybercriminals increasing their focus on mobile devices? (Check Point)

At a time when workforces around the world are becoming increasingly distributed, there’s a genuine risk that the mobile arena could soon become the new corporate cybersecurity battleground.

Thursday 3/31

Announcing the Citrix Virtual Apps and Desktops 2203 LTSR!

Citrix Virtual Apps and Desktops 2203 is the successor to Citrix Virtual Apps and Desktops 2112. This means you can roll out 2203 into your environments today and start testing to stay up to date.

9 Tips to Protect Your Remote Endpoints (IGEL)

To ensure your business data and systems stay protected against cyber risks, consider the following tips for securing remote endpoints at your organization.

Securing the Future of Payments: PCI SSC Publishes PCI Data Security Standard v4.0

Today, the PCI Security Standards Council (PCI SSC), a global payment security forum, published version 4.0 of the PCI Data Security Standard (PCI DSS). PCI DSS is a global standard that provides a baseline of technical and operational requirements designed to protect account data.

Friday 4/1

How to Create a Data Breach Response Team (Pure Storage)

Having an emergency response team (ERT) in place is critical before a cybersecurity event occurs. See who should be on the team and what technology you’ll need.

The Case for Building Identity Security into Enterprise UX Design (CyberArk)

If user-centric Identity and Access Management (IAM) protections aren’t integrated tightly into enterprise software design, overall product security and quality will likely suffer.