Monday 6/20
ICYMI: Ken Phelan, was joined by Gotham’s EUC & Cloud Practice Director, Brian Wagner, and Rubrik, Inc.’s Christopher Culver and Drew Russell for a discussion surrounding Modern Resiliency.
https://www.youtube.com/watch?v=XO9-Z3J_5_8
Make device management simpler with Citrix Provisioning Services (Citrix)
Citrix has made many optimizations and tweaks throughout the years to ensure that PVS performs at its best from the perspective of device check-ins, failover times, and scalability.
https://bit.ly/3b2wkjW
Anatomy of a Ransomware Attack (Varonis)
While 'crash and burn' ransomware attacks do occur, an attacker is far more likely to live within an enterprise environment for a significant amount of time before encrypting data. During this period, the threat actor will seek to escalate privileges, perform internal discovery for sensitive data or additional footholds, exfiltrate critical data, and finally cause the destruction of stored data.
https://bit.ly/3tOq4CT
Tuesday 6/21
The World's #1 Network Firewall Also Delivers Powerful Networking Solutions (Fortinet)
The power behind FortiGate starts with FortiOS everywhere, the common operating system for all FortiGate advanced network and security functions spanning on-premises and cloud environments. And because every solution running on the FortiGate platform runs on FortiOS, they are not simply integrated. They are the same product.
https://bit.ly/3HHi4cL
Magecart attacks are still around. And they are becoming more stealthy
Also known as card-skimming attacks, threat actors will often exploit a vulnerability in the backend content management system of a website or third-party dependencies and covertly implant malicious JavaScript code.
https://zd.net/39NpPkG
Wednesday 6/22
Apps are Increasingly Distributed. Your WAF Technology Needs to Adapt. (F5)
As workload deployments proliferate across diverse environments and app architectures, organizations want to be able to enforce consistent security controls across all applications, anywhere.
https://bit.ly/3xLmefd
Check Point Meets International Cybersecurity Standards for Governments and Enterprises around the world (Check Point)
Check Point once again achieves the internationally recognized Common Criteria certification for its Quantum security solutions including gateways, firewalls and cybersecurity management platforms.
https://bit.ly/3OcyM6k
Thursday 6/23
Key Benefits in Transitioning from CVAD 7.15 to 1912 or 2203 LTSR
Citrix Virtual Apps and Desktops 7.15 LTSR will reach End of Life (EOL) on August 15, 2022. Customers using this version who wish to remain on the LTSR track must upgrade to 1912 or 2203 LTSR before then or risk being on an unsupported platform. Besides supportability, there are additional benefits for upgrading to 1912 and 2203 LTSR.
https://bit.ly/3nc6fli
How Rubrik Supports the NIST Cybersecurity Framework Profile for Ransomware Risk Management (Rubrik)
Rubrik helps you understand the blast radius of a ransomware attack so you understand what data has been targeted so you can gauge business impact and prioritize response, while also understanding the regulatory impact of any personally identifiable information (PII) you define, that may have been exfiltrated as part of a double extortion attack.
https://bit.ly/3N9WUoR
Ransomware Risk in Healthcare Endangers Patients
Healthcare leaders, physicians, and other care providers need to look at cybersecurity risks through a new lens — patient health and safety.
https://bit.ly/3OfcWPF
Friday 6/24
How Threat Actors Hijack Attention: The 2022 Social Engineering Report (Proofpoint)
From financially motivated cybercrime, to business email compromise (BEC) fraud, to advanced persistent threat (APT) actors, Proofpoint has observed countless tactics, techniques, and procedures relying on humans’ fundamental propensity to open and respond to emails.
https://bit.ly/3xMKu0m
CISA Releases Second Version of Guidance for Secure Migration to the Cloud
The Cloud Services TRA is designed to guide agencies’ secure migration to the cloud by defining and clarifying considerations for shared services, cloud migration, and cloud security posture management.
https://bit.ly/3Nj9rX0