This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On November 04, 2022

Monday 10/31

Citrix Cloud Connectors: How they work and how to get the most from them (Citrix)

Cloud Connectors unlock the advantages of cloud management by bridging on-prem and cloud deployments, without requiring complex networking or infrastructure configuration.

https://bit.ly/3FvOzLO

Cyber Threats Happen — Prevention, Protection and Recovery Tips (Palo Alto Networks)

While there’s no way to predict a bad actor’s next move, we do know that people are the first line of defense, and they can significantly help prevent an attempted attack from becoming a successful one.

https://bit.ly/3zudkUS

Tuesday 11/1

Are you re-using passwords across web platforms? Think again! Stolen credentials databases are a flourishing underground market (Check Point)

Although most of the population understands the risk and knows that one shouldn’t reuse passwords, most of us continue reusing passwords for both corporate and personal accounts.

https://bit.ly/3TVo5b4

CISA Releases Guidance on Phishing-Resistant and Numbers Matching Multifactor Authentication

CISA has released two fact sheets to highlight threats against accounts and systems using certain forms of multifactor authentication (MFA). CISA strongly urges all organizations to implement phishing-resistant MFA to protect against phishing and other known cyber threats.

https://bit.ly/3TV6FLL

Wednesday 11/2

Smishing: What It Is, Why It Matters, and How to Protect Yourself (Arctic Wolf)

Smishing has been working so well for the bad guys because text messages increase their chances of getting their message to their target.

https://bit.ly/3fvq8nh

5 Identity Security Considerations for Updating Software (CyberArk)

Last year, threat researchers logged 18,439 common vulnerabilities and exposures (CVEs) in the NIST National Vulnerability Database (NVD) – or more than 50 new flaws per day. With so many vulnerabilities piling up, security teams don’t have the time or resources to make every software update, every time a new vulnerability is disclosed.

https://bit.ly/3DxvhmP

Thursday 11/3

Transformation Depends on People. Empower Them with Flexible Services (Pure Storage)

Your people are at the heart of your organization, and they need flexibility and flexible services to empower them and make your digital transformation a success.

https://bit.ly/3FH7dAp

FBI and CISA: Here's what you need to know about DDoS attacks

DDoS attacks can be cheap to create but disruptive, so it could be worthwhile for network defenders to take a look at CISA's and the FBI's guidance as a backup to what they likely already know about the attacks, which can overload networks, protocols, and applications.

https://zd.net/3DBrdSo

Friday 11/4

Infrastructure Security is Not Enough to Defend Against Ransomware (Rubrik)

When attackers penetrate the infrastructure defense, they can access critical business data and destroy, encrypt, or exfiltrate it. Once they get in, how do you stop them from taking your business down by holding your data hostage?

https://bit.ly/3fCEHWb

Ransomware Roundup: New FBI, Wise Guys, and “Pyschedelic” Ransomware (Fortinet)

Due to the ease of disruption, damage to daily operations, potential impact to an organization's reputation, and the unwanted destruction or release of personally identifiable information (PII), etc., it is vital to keep all AV and IPS signatures up to date.

https://bit.ly/3fAHijq