Get more out of your native Azure Virtual Desktop with the Citrix Optimization Pack (Citrix)
The Citrix Optimization Pack for Azure Virtual Desktop is a new Citrix offering for optimizing native Azure Virtual Desktop workloads. It includes Workspace Environment Management (WEM) service within Citrix Cloud as the primary offering, which you can use to better manage, optimize, and secure your native Azure Virtual Desktop environments.
Not All Firewalls Can Do Zero Trust (But Ours Can) (Fortinet)
To discount firewalls entirely is a mistake. If you have the right next-generation firewall with zero-trust network access (ZTNA) built-in across all form factors, you can leverage its extensive capabilities to control access for everyone across an extended network, covering both cloud and on-premises-based applications.
Conti Ransomware: An Analysis of Key Findings (Arctic Wolf)
While victim organizations are varied, Conti’s dark web blog exposed manufacturing, construction, and technology firms most often.
Emotet Tests New Delivery Techniques (Proofpoint)
In November 2021, 10 months after its disappearance from the threat landscape, Proofpoint observed a reemergence of this notorious botnet, and since then, the group associated with Emotet, TA542, has targeted thousands of customers with tens of thousands of messages in multiple geographic regions. In some cases, the message volume reaches over one million per campaign.
Join us on Wednesday, May 18, at 9:30 AM for our next CTO Tech Talk where Gotham CTO Ken Phelan will be joined by Reciprocity’s Chief Strategy Officer, Rob Ellis, to demystify SOC and ISO compliance.
See the link below for registration details.
Announcing Fibre Channel Advancements in FlashArray (Pure Storage)
Fibre Channel is continually being enhanced to better meet the demands of the enterprise. Pure is pleased to announce several new Fibre Channel advancements in FlashArray™.
CrowdStrike Delivers Adversary-Focused, Platform Approach to CNAPP and Cloud Security (CrowdStrike)
CrowdStrike unveiled new Cloud Native Application Protection Platform (CNAPP) capabilities, providing customers with comprehensive visibility, detection and remediation to secure cloud workloads with coverage from development to runtime.
The Biggest Cloud Security Challenges in 2022 (Check Point)
With the move to the cloud comes a need for cloud security. These cloud-based applications must be protected against attack, and cloud-hosted data must be protected against unauthorized access in accordance with applicable regulations.
Ransomware demands are growing, but life is getting tougher for malware gangs
Victims of ransomware attacks are paying higher ransoms than ever before, but there are signs that organisations are starting to take heed of cybersecurity advice, making them more resilient to cyber criminals.
Varonis Debuts Trailblazing Features for Securing Salesforce (Varonis)
Varonis radically simplifies permissions analysis, showing you not only what someone’s net effective permissions are, but also how they got them.
CISA, FBI, NSA, and International Partners Warn Organizations of Top Routinely Exploited Cybersecurity Vulnerabilities
“We know that malicious cyber actors go back to what works, which means they target these same critical software vulnerabilities and will continue to do so until companies and organizations address them,” said CISA Director Jen Easterly.
This phishing campaign delivers malware that steals your passwords and chat logs
RedLine Stealer uses CVE-2021-26411 exploits found in Internet Explorer to deliver the payload. The vulnerability was disclosed and issued with a patch last year, so the malware can only infect users who have yet to apply the security update.