This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On April 22, 2022

Monday 4/18

ICYMI: Gotham’s CTO, Ken Phelan, was joined by Palo Alto Networks’ Field CTO, Jason Georgi, where they discussed Secure Access Service Edge (SASE) and if the technology is ready for primetime. See the link below for the full video.

Wide Open Outbound Firewall Policy – Part 1

Although the open policy allows for ease of use (for systems administrators), it also introduces significant risks attached to users operating applications that are in the range from very dangerous through to not corporate authorized to outright illegal.

Trends in the Recent Emotet Maldoc Outbreak (Fortinet)

The recent Emotet outbreak uses phishing emails combined with social engineering to trick victims into loading the malware onto their devices. These emails often include "Re:" or "Fw:" in the subject line to disguise the email as a reply or forwarded message to help convince the target that the email is legitimate.

State of Application Strategy 2022: Time to Modernize Ops (F5)

As organizations accelerate their journey to become a digital business, CIOs are taking the wheel and kicking the technology engine into high gear to power organizations through the second phase of digital transformation with a shift in focus from modernizing apps to modernizing ops.

Tuesday 4/19

Top 5 New Features in Citrix Virtual Apps and Desktops 2203 LTSR

Citrix recently released the first new LTSR version of Citrix Virtual Apps and Desktops in over two years. Here is what I feel are the top 5 new features and enhancements available in 2203.

Social Networks Most Likely to be Imitated by Criminal Groups, with LinkedIn Now Accounting for Half of all Phishing Attempts Worldwide (Check Point)

The latest Brand Phishing Report for Q1 2022 highlights the brands which were most frequently imitated by criminals in their attempts to steal individuals’ personal information or payment credentials during January, February and March 2022.

Don’t Pay the Ransom: Keep Your Data Protected with Auto-on SafeMode (Pure Storage)

With Auto-on SafeMode, that protection is on by default, which means your data will be automatically protected. Even when malware has compromised storage APIs to try to find and programmatically delete all snapshots and backups, Auto-on SafeMode will provide immutable protection.

Wednesday 4/20

The State of Cybersecurity in 2022 (Arctic Wolf)

The rapid changes made nearly overnight to infrastructure, applications, and access controls during 2020’s huge shift to remote work were now under scrutiny, while security teams were still busy defending against the litany of attacks and attack methods.

5 new ways Citrix and Google are simplifying your cloud transition (Citrix)

Citrix and Google Cloud are committed to continued development and innovation for customers — from tools to networking to DaaS solutions for every user.

Thursday 4/21

4 Ways to Strengthen Your Identity Provider with Defense in Depth (CyberArk)

No matter your organization’s industry or size, security matters. Take the time to evaluate your digital identity landscape for potential gaps and learn how a defense-in-depth approach can help address security vulnerabilities and provide additional assurances.

New FedRAMP Authorization Secures IoT Devices for Federal Agencies (Palo Alto Networks)

The growth of globally-interconnected systems and the increase in cyberthreats are causing security challenges for federal agencies. With the added responsibility of maintaining national security and adhering to mandates, federal agencies are experiencing increased pressure to accelerate the adoption of a Zero Trust architecture.

Friday 4/22

Hive Ransomware Analysis (Varonis)

First observed in June 2021, Hive is an affiliate-based ransomware variant used by cybercriminals to conduct ransomware attacks against healthcare facilities, nonprofits, retailers, energy providers, and other sectors worldwide. Hive is built for distribution in a Ransomware-as-a-service model that enables affiliates to utilize it as desired.

Rethinking Cyber-Defense Strategies in the Public-Cloud Age

There are indeed many challenges, because there are multiple factors that complicate the deployment and maintenance of highly secure cloud environments.