This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On May 06, 2022

Monday 5/2

What’s new and next with Citrix Virtual Apps and Desktops: Q&A (Citrix)

With our updates on the Long-Term Service Release (LTSR), optimizing unified communications platforms, security enhancements, and more, there are a number of enhancements we want to dive deep into.

https://bit.ly/39wOhXg

Cracks forming in the ransomware ecosystem (Check Point)

Thanks to the efforts of white hat researchers and security specialists, as well as governments around the world now strengthening their security posture and taking a more proactive approach, cracks in the ransomware ecosystem are now starting to appear.

https://bit.ly/3MKTVDn

Tuesday 5/3

How to Build a Sustainable Security Culture That Drives Behavior Change (Proofpoint)

A couple of hours of training annually won’t prompt most users to adopt a security mindset for the long term. Building a robust security culture will.

https://bit.ly/3kxPlwa

Bad Actors Are Maximizing Remote Everything

Enterprises must take a work-from-anywhere approach to their security. They need to deploy solutions capable of following, enabling and protecting users no matter where they are located. They need security on the endpoint (EDR) combined with?zero trust network access (ZTNA) approaches.

https://bit.ly/3vBSGk6

Wednesday 5/4

5 Most Disruptive Vulnerability Types (Arctic Wolf)

Organizations everywhere struggle with the complexity of identifying, prioritizing, and managing security risks within their environment—all while these risks pile up, leaving organizations vulnerable to threats and damaging data breaches. If it sounds like a task too daunting to tackle, it might be time to turn to a security operations solutions provider.

https://bit.ly/3MMC3rO

You’ve Got Privileged Access Management… But Can You Keep Secrets Secure? (CyberArk)

While cyber attacks can be inevitable, damage and disruption are not. Organizations that take a privilege-centric approach to securing identities — both human and machine — are better positioned to stop attackers from reaching valuable assets and data.

https://bit.ly/37YbUYp

Thursday 5/5

Ensuring Strong Cyber Hygiene on World Password Day (Fortinet)

World Password Day is a reminder for users to update weak or old passwords to ensure the security of personal and corporate information. As cyber threats continue to evolve and bad actors develop new attack techniques, a good cybersecurity posture requires more than just a strong password to avoid compromise.

https://bit.ly/3kGF695

Ransomware Attacks Surged By 37 Percent In 2021: Sophos Survey

Ransom payments increased five-fold to an average $812,360 last year, the survey finds.

https://bit.ly/3LNdb2V

Friday 5/6

Check Point Software Outlines Five Must-Haves for Creating a Secure Password (Check Point)

Check Point Software Technologies is raising awareness of the most common mistakes made by users when creating and managing passwords, offering practical advice on how to keep private data protected.

https://bit.ly/3yfIy2p

Protect Microsoft 365 with Pure and Veeam (Pure Storage)

Many organizations use software-as-a-service offerings like Microsoft 365. Veeam and Pure Storage provide fast recovery and protection from cyber threats for this critical data.

https://bit.ly/38XEbhV

F5 Warns of Critical Bug Allowing Remote Code Execution in BIG-IP Systems

Application service provider F5 is warning a critical vulnerability allows unauthenticated hackers with network access to execute arbitrary commands on its BIG-IP systems.

https://bit.ly/3wd5Sv7