This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On October 07, 2022

Monday 10/3

Q&A on Cyber Resiliency for Operational Technology (Fortinet)

Fortinet’s CISO for Operational Technology, Willi Nelson, shares perspective on considerations when developing cyber resilience, covering fundamentals and strategic planning, to protect the convergence of IT and OT environments.

Hackers are testing a destructive new way to make ransomware attacks more effective

Ransomware hackers are experimenting with a new kind of attack that, instead of encrypting data, outright destroys it. The aim is to make it impossible for victims to retrieve their data if they don't pay the ransom.

Tuesday 10/4

What’s new with Citrix DaaS and Citrix Virtual Apps and Desktops – September 2022 (Citrix)

Citrix DaaS and Citrix Virtual Apps and Desktops deliver new features and enhancements that make it easier than ever for organizations to create agile work environments with apps and desktops delivered securely anywhere, on any device.

This Cybersecurity Awareness Month, Set Your Identity Security Strategy to Master Cyber Fundamentals (CyberArk)

The 2022 theme of “See Yourself in Cyber” doesn’t just encourage consumers to #BeCyberSmart in protecting their personal identities and information — it also underscores the role each cybersecurity professional plays in defending their organization and strengthening the broader supply chain ecosystem against pervasive identity-based attacks and data breaches.

Wednesday 10/5

Business Email Compromise: Essential Security Awareness Training Topic (Proofpoint)

Attackers use social engineering to trick people into clicking unsafe URLs, opening malicious attachments, entering their credentials, sending sensitive data, transferring funds and more.

What’s the Story Around Cyber Attackers and IP Cameras? (Check Point)

Today, CCTV (or internet-connected security cameras) are one of the most preferred ways for cyber attackers to penetrate corporate networks, as they are inherently vulnerable and serve as the easiest entry point for attackers.

Thursday 10/6

ICYMI: Gotham’s CTO Ken Phelan was joined by Cybersixgill’s Director of Threat Intelligence for North America, Brad Liggett, for a discussion to help businesses better understand the dark web. See the link below for the full video

Azure Managed Identities: Definition, Types, Benefits + Demonstration (Varonis)

Removing credentials from the code tightens an application’s security, but now how will you manage these credentials, keys, and secrets? This is where managed identities come into play.

Adversaries Have Their Heads in Your Cloud (CrowdStrike)

The rapid proliferation of cloud technology has empowered organizations to meet complex challenges with innovative solutions. This flexibility, however, is the antithesis of security — each new cloud solution that an organization adopts expands their attack surface.

Friday 10/7

The Uber Hack Explained

In recent days, it has been widely reported that Uber suffered a significant intrusion into their network. While the extent of the damage is unknown, we do know about the sequence of events that allowed the breach to be successful.

Additional Updated Guidance for Microsoft Exchange Zero-Day Vulnerabilities Exploited in the Wild (Arctic Wolf)

Late Wednesday, October 5, 2022, Microsoft published additional updated mitigation guidance for the two zero-day vulnerabilities in Microsoft Exchange Server that were exploited in the wild: CVE-2022-41040 (SSRF vulnerability) and CVE-2022-41082 (RCE vulnerability).

Cybersecurity Month 2022: Resources to Help You Now (Pure Storage)

With Cybersecurity Awareness Month upon us, it’s the ideal time to consider the proactive steps you can take to protect your critical infrastructure now while preparing for the cyber challenges of tomorrow.