Monday 5/2
What’s new and next with Citrix Virtual Apps and Desktops: Q&A (Citrix)
With our updates on the Long-Term Service Release (LTSR), optimizing unified communications platforms, security enhancements, and more, there are a number of enhancements we want to dive deep into.
https://bit.ly/39wOhXg
Cracks forming in the ransomware ecosystem (Check Point)
Thanks to the efforts of white hat researchers and security specialists, as well as governments around the world now strengthening their security posture and taking a more proactive approach, cracks in the ransomware ecosystem are now starting to appear.
https://bit.ly/3MKTVDn
Tuesday 5/3
How to Build a Sustainable Security Culture That Drives Behavior Change (Proofpoint)
A couple of hours of training annually won’t prompt most users to adopt a security mindset for the long term. Building a robust security culture will.
https://bit.ly/3kxPlwa
Bad Actors Are Maximizing Remote Everything
Enterprises must take a work-from-anywhere approach to their security. They need to deploy solutions capable of following, enabling and protecting users no matter where they are located. They need security on the endpoint (EDR) combined with?zero trust network access (ZTNA) approaches.
https://bit.ly/3vBSGk6
Wednesday 5/4
5 Most Disruptive Vulnerability Types (Arctic Wolf)
Organizations everywhere struggle with the complexity of identifying, prioritizing, and managing security risks within their environment—all while these risks pile up, leaving organizations vulnerable to threats and damaging data breaches. If it sounds like a task too daunting to tackle, it might be time to turn to a security operations solutions provider.
https://bit.ly/3MMC3rO
You’ve Got Privileged Access Management… But Can You Keep Secrets Secure? (CyberArk)
While cyber attacks can be inevitable, damage and disruption are not. Organizations that take a privilege-centric approach to securing identities — both human and machine — are better positioned to stop attackers from reaching valuable assets and data.
https://bit.ly/37YbUYp
Thursday 5/5
Ensuring Strong Cyber Hygiene on World Password Day (Fortinet)
World Password Day is a reminder for users to update weak or old passwords to ensure the security of personal and corporate information. As cyber threats continue to evolve and bad actors develop new attack techniques, a good cybersecurity posture requires more than just a strong password to avoid compromise.
https://bit.ly/3kGF695
Ransomware Attacks Surged By 37 Percent In 2021: Sophos Survey
Ransom payments increased five-fold to an average $812,360 last year, the survey finds.
https://bit.ly/3LNdb2V
Friday 5/6
Check Point Software Outlines Five Must-Haves for Creating a Secure Password (Check Point)
Check Point Software Technologies is raising awareness of the most common mistakes made by users when creating and managing passwords, offering practical advice on how to keep private data protected.
https://bit.ly/3yfIy2p
Protect Microsoft 365 with Pure and Veeam (Pure Storage)
Many organizations use software-as-a-service offerings like Microsoft 365. Veeam and Pure Storage provide fast recovery and protection from cyber threats for this critical data.
https://bit.ly/38XEbhV
F5 Warns of Critical Bug Allowing Remote Code Execution in BIG-IP Systems
Application service provider F5 is warning a critical vulnerability allows unauthenticated hackers with network access to execute arbitrary commands on its BIG-IP systems.
https://bit.ly/3wd5Sv7