This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On July 08, 2022

Monday 6/27

The Importance of a Consistent Security Policy (Palo Alto Networks)

Building upon industry-leading security technologies in conjunction with strong technology partnerships, Palo Alto Networks can help you consolidate your approach to security while maintaining crucial IT business continuity.

What is an Insider Threat? Definition and Examples (Varonis)

The individual doesn’t need to be an employee, and the harm may not even be deliberate, but insider threats are still a significant risk that many businesses don’t take seriously enough.

Tuesday 6/28

10 reasons to try Citrix DaaS Standard for Azure (Citrix)

Citrix now offers Citrix DaaS Standard for Azure, a simple, easy-to-implement solution that is part of our Citrix DaaS family of cloud services and offers a low cost, secure way to deliver cloud-based Windows or Linux desktops and apps to your workforce.

Malicious Hackers go to Work as We Head for the Sun: Travelers Need to be on Their Guard Over the Summer Holidays and Weekend Breaks (Check Point)

With summer travel expected to increase this year, Check Point warns travelers to stay vigilant and follow cyber safety precautions to stay protected before and whilst on vacation.

Wednesday 9/29

5 Ways to Support Remote Employees on the Move (Pure Storage)

The desire to work from anywhere is no longer a want; it has become an expectation. And with this expectation comes additional risk.

This new malware is now at the heart of the ransomware ecosystem

Bumblebee provides the attackers with a backdoor onto the PC, enabling them to take control of operations and run commands. From here, the attackers run Cobalt Strike on the system for further control and the ability to gather more information from the machine that can help to conduct the attack.

Thursday 6/30

Detecting and Mitigating NTLM Relay Attacks Targeting Microsoft Domain Controllers (CrowdStrike)

Though patching is an important first step against the latest NTLM relay vulnerabilities, it is not enough, as many unsecured defaults can leave your domain vulnerable.

Palo Alto Networks Products Added to the DoD ESI Portfolio (Palo Alto Networks)

The award of the DOD ESI enterprise-wide contract means that DOD and IC agencies can now easily include almost all Palo Alto Networks products and services, such as our Next-Gen CASB and the Cortex XDR platform, in their plans for digital transformation and IT modernization.

Tuesday 7/5

What’s new with Citrix DaaS and Citrix Virtual Apps and Desktops — June 2022 (Citrix)

The new, modernized DaaS solutions make it easier than ever to accelerate your cloud journey and manage secure workloads that increase business agility and deliver an excellent user experience at scale.

Proofpoint and Palo Alto Networks Partner, Integrate Automated Browser Isolation (Proofpoint, Palo Alto Networks)

As enterprises seek to reduce the risk of web-based and URL attacks, businesses strive to implement a combination of products that can protect and address these threats and enable highly flexible monitoring and high-availability capabilities.

Wednesday 7/6

Securing Cloud Environments by Lifting the Veil on Excessive Permissions (CyberArk)

Attackers can create just as much damage by compromising or creating cloud admin accounts with powerful privileges outside of the organization’s existing privileged access management (PAM) program.

Secure SD-WAN: The Foundation for Network Transformation (Fortinet)

Whether deployed on-prem, in the cloud, as a cloud-based service, or even as part of a larger solution, Secure SD-WAN will continue to securely connect users, devices, and networks with critical applications and resources regardless of where they are deployed.

Thursday 7/7

Join us on Thursday, July 21, for our next CTO Tech Talk. Gotham CTO Ken Phelan will be joined by CyberArk’s Senior Director, Global Technology Office, Chris Maroun, to discuss Privileged Access. See the link below for registration details.

Cloud Data Security Challenges, Part 1: Gaining Visibility (Pure Storage)

There’s a good reason cloud security has become the fastest-growing segment of the security market: Companies are realizing that their data isn’t necessarily secure just because it’s in the cloud and behind the shield of a major hyperscaler/cloud provider.

Friday 7/8

86 Ransomware Statistics, Data, Trends, and Facts [updated 2022] (Varonis)

Ransomware attacks are on the rise and continue to be a disruptive force in the cybersecurity industry, affecting everything from financial institutions to higher education. Because of the increase in remote work — prompted by the pandemic —  attacks are up 148 percent.

How CrowdStrike’s Machine Learning Model Automation Uses the Cloud to Maximize Detection Efficacy (CrowdStrike)

The CrowdStrike Falcon® platform takes full advantage of the power of the CrowdStrike Security Cloud to reduce high-cost false positives and maximize detection efficacy to stop breaches

Amazon Prime Day or Amazon Crime Day? Don’t Fall Victim to Phishing, Warns Check Point Software (Check Point)

Clearly tracking this trend, cybercriminals are also sharpening their own upcoming surprises and gearing up to exploit the excitement of shoppers.