This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On June 24, 2022

Monday 6/20

ICYMI: Ken Phelan, was joined by Gotham’s EUC & Cloud Practice Director, Brian Wagner, and Rubrik, Inc.’s Christopher Culver and Drew Russell for a discussion surrounding Modern Resiliency.

Make device management simpler with Citrix Provisioning Services (Citrix)

Citrix has made many optimizations and tweaks throughout the years to ensure that PVS performs at its best from the perspective of device check-ins, failover times, and scalability.

Anatomy of a Ransomware Attack (Varonis)

While 'crash and burn' ransomware attacks do occur, an attacker is far more likely to live within an enterprise environment for a significant amount of time before encrypting data. During this period, the threat actor will seek to escalate privileges, perform internal discovery for sensitive data or additional footholds, exfiltrate critical data, and finally cause the destruction of stored data.

Tuesday 6/21

The World's #1 Network Firewall Also Delivers Powerful Networking Solutions (Fortinet)

The power behind FortiGate starts with FortiOS everywhere, the common operating system for all FortiGate advanced network and security functions spanning on-premises and cloud environments. And because every solution running on the FortiGate platform runs on FortiOS, they are not simply integrated. They are the same product.

Magecart attacks are still around. And they are becoming more stealthy

Also known as card-skimming attacks, threat actors will often exploit a vulnerability in the backend content management system of a website or third-party dependencies and covertly implant malicious JavaScript code.

Wednesday 6/22

Apps are Increasingly Distributed. Your WAF Technology Needs to Adapt. (F5)

As workload deployments proliferate across diverse environments and app architectures, organizations want to be able to enforce consistent security controls across all applications, anywhere.

Check Point Meets International Cybersecurity Standards for Governments and Enterprises around the world (Check Point)

Check Point once again achieves the internationally recognized Common Criteria certification for its Quantum security solutions including gateways, firewalls and cybersecurity management platforms.

Thursday 6/23

Key Benefits in Transitioning from CVAD 7.15 to 1912 or 2203 LTSR

Citrix Virtual Apps and Desktops 7.15 LTSR will reach End of Life (EOL) on August 15, 2022. Customers using this version who wish to remain on the LTSR track must upgrade to 1912 or 2203 LTSR before then or risk being on an unsupported platform. Besides supportability, there are additional benefits for upgrading to 1912 and 2203 LTSR.

How Rubrik Supports the NIST Cybersecurity Framework Profile for Ransomware Risk Management (Rubrik)

Rubrik helps you understand the blast radius of a ransomware attack so you understand what data has been targeted so you can gauge business impact and prioritize response, while also understanding the regulatory impact of any personally identifiable information (PII) you define, that may have been exfiltrated as part of a double extortion attack.

Ransomware Risk in Healthcare Endangers Patients

Healthcare leaders, physicians, and other care providers need to look at cybersecurity risks through a new lens — patient health and safety.

Friday 6/24

How Threat Actors Hijack Attention: The 2022 Social Engineering Report (Proofpoint)

From financially motivated cybercrime, to business email compromise (BEC) fraud, to advanced persistent threat (APT) actors, Proofpoint has observed countless tactics, techniques, and procedures relying on humans’ fundamental propensity to open and respond to emails.

CISA Releases Second Version of Guidance for Secure Migration to the Cloud

The Cloud Services TRA is designed to guide agencies’ secure migration to the cloud by defining and clarifying considerations for shared services, cloud migration, and cloud security posture management.