We would like to welcome Mark Taylor to Gotham Technology Group. Working with our highly accomplished Outside Sales team, Mark will help us meet the increased market demand for IT security and infrastructure services. We are excited to have you join us!
Improved Phishing Reporting and Remediation with Email Warning Tags “Report Suspicious” (Proofpoint)
Our HTML-based email warning tags have been in use for some time now. And we’re happy to announce that all customers with the Proofpoint Email Security solution can now easily upgrade and add the “Report Suspicious” functionality.
Falcon Fusion Accelerates Orchestrated and Automated Response Time (CrowdStrike)
CrowdStrike Falcon Fusion automates and accelerates incident response by orchestrating sandbox detonations to automatically analyze related malware samples and enrich the results with industry-leading threat insights
Citrix Features Explained: Adaptive authentication and access in Citrix Secure Private Access (Citrix)
Adaptive policies enable your organization to determine the appropriate levels of access for all employees, then automatically enforce these IT security policies without disrupting the hybrid work experience.
DBaaS or DIY? Build versus Buy Comparison (Pure Storage)
When deciding between DIY and DBaaS solutions for your organization’s database model, it’s essential to carefully examine the database’s entire lifespan for hidden costs. Factors like security or staff costs will significantly affect your organization’s effectiveness and productivity, so be sure to match your database model to your organization’s current and future capabilities and needs.
Top Cyber Attacks of April 2022 (Arctic Wolf)
The attacks came from all corners in the past month, as cybercriminals used administrative access codes, stolen internal data, laser-focused programming tools, and even humble job applications to worm their way into organizations' inner workings.
Spoofing SaaS Vanity URLs for Social Engineering Attacks (Varonis)
Threat actors can use their own SaaS accounts to generate links to malicious content (files, folders, landing pages, forms, etc.) that appears to be hosted by your company’s sanctioned SaaS account. Achieving this is as easy as changing the subdomain in the link.
How the evolution of Ransomware changed the threat landscape (CyberArk)
Over the last five years, ransomware operations made a long way from random spray and pray emails to multi-million dollar businesses, conducting targeted and man-operated attacks affecting the organizations in almost any geographic location and within any industry.
Actively Exploited Zero-Day Bug Patched by Microsoft
Microsoft’s May Patch Tuesday roundup also included critical fixes for a number of flaws found in infrastructure present in many enterprise and cloud environments.
Why the World Needs ZTNA 2.0 (Palo Alto Networks)
It’s time to move towards a new approach we’re calling ZTNA 2.0. Delivered from Prisma Access, ZTNA 2.0 is designed around an easy-to-use, unified security product.
Ransomware in numbers: How 2,500 potential targets turns into one actual attack
Ransomware as a Service (RaaS) has forced Microsoft to look at attacks differently. It's not one actor, but many, meaning that identifying the ransomware family itself doesn't give defenders the full picture of threats on the network.