Monday 3/28
CISA Adds 66 Known Exploited Vulnerabilities to Catalog
CISA has added 66 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
https://bit.ly/3DkrkRH
From the Shotgun Approach to Triple Extortion: The Evolving Ransomware Threat (Fortinet)
Although overall ransomware remains a top concern, there are proactive measures organizations of almost any size can, and should take, to minimize the impact of a ransomware incident.
https://bit.ly/36Ant7k
Tuesday 3/29
Join us on Wednesday, April 13, at 9:30 AM, for our next CTO Tech Talk. Gotham's CTO, Ken Phelan, will be joined by Palo Alto Networks’ Prisma Access/SASE Field CTO, Jason Georgi, to discuss SASE and if it's ready for primetime. See the link below for registration details.
https://bit.ly/3wIr9i0
Suspicious Login Detection with your Cloud Identity Provider Through Proofpoint CASB (Proofpoint)
The growth of cloud storage, the rise of remote work and greater use of cloud applications for anytime-anywhere workforce collaboration are all helping to increase attackers’ interest in targeting cloud accounts.
https://bit.ly/3JSx4Vl
Collaboration is Crucial to Combating Cybercrime (Fortinet)
Our goal is not only to prevent attacks, but we also want to dismantle and force cybercriminals to change models, approaches, and techniques, which demands their time, effort, and resources.
https://bit.ly/3uBzLo3
Wednesday 3/30
Multi-Cloud Networking for Telcos: No Pain, More Gain (F5)
As apps are increasingly composed of micro-services, we are moving to a world where one app is typically spread across different environments. In other words, apps are becoming both distributed and decomposed.
https://bit.ly/35t6bbO
Why are cybercriminals increasing their focus on mobile devices? (Check Point)
At a time when workforces around the world are becoming increasingly distributed, there’s a genuine risk that the mobile arena could soon become the new corporate cybersecurity battleground.
https://bit.ly/3qK3tWQ
Thursday 3/31
Announcing the Citrix Virtual Apps and Desktops 2203 LTSR!
Citrix Virtual Apps and Desktops 2203 is the successor to Citrix Virtual Apps and Desktops 2112. This means you can roll out 2203 into your environments today and start testing to stay up to date.
https://bit.ly/3IXceCS
9 Tips to Protect Your Remote Endpoints (IGEL)
To ensure your business data and systems stay protected against cyber risks, consider the following tips for securing remote endpoints at your organization.
https://bit.ly/3qQ6ZPe
Securing the Future of Payments: PCI SSC Publishes PCI Data Security Standard v4.0
Today, the PCI Security Standards Council (PCI SSC), a global payment security forum, published version 4.0 of the PCI Data Security Standard (PCI DSS). PCI DSS is a global standard that provides a baseline of technical and operational requirements designed to protect account data.
https://bit.ly/3NCFKBC
Friday 4/1
How to Create a Data Breach Response Team (Pure Storage)
Having an emergency response team (ERT) in place is critical before a cybersecurity event occurs. See who should be on the team and what technology you’ll need.
https://bit.ly/3qTNG7S
The Case for Building Identity Security into Enterprise UX Design (CyberArk)
If user-centric Identity and Access Management (IAM) protections aren’t integrated tightly into enterprise software design, overall product security and quality will likely suffer.
https://bit.ly/3tH8sYW