This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On March 17, 2023

Monday 3/13

Actionable Insights: Increasing Your Organization’s “Risk Efficacy” Through Targeted Controls (Proofpoint)

Using actionable insights to assess your cybersecurity measures is key to protecting against potential threats.

http://bit.ly/3JxZw1a

CISA: Do these three things to toughen up your network against hackers (ZDNet)

Cybersecurity agency shares the lessons learned from a red team assessment of a critical infrastructure organization.

http://bit.ly/42bWoiW

Tuesday 3/14

Detection and Response for Identity Threats (Palo Alto Networks)

Organizations expect modern threat detection solutions to deliver identity and behavioral based threat detection, seamlessly, in order to detect covert security threats.

http://bit.ly/3Fp303r

Is your security team concerned with unmanaged devices? (Check Point)

The threat has become more pressing due to the tsunami-like surge of attacks over the past years and the growing number of BYOD policies at organizations.

http://bit.ly/3Tmhya0

Wednesday 3/15

Old Cyber Gang Uses New Crypter – ScrubCrypt (Fortinet)

This payload extracts ScrubCrypt, which obfuscates and encrypts applications and makes them able to dodge security programs. It already has an updated version, and the seller’s webpage guarantees that it can bypass Windows Defender and provide anti-debug and some bypass functions.

http://bit.ly/40aaShq

How to Streamline Security Operations With Identity Security Intelligence (CyberArk)

SOC teams must work across the security organization to collect and analyze the right data and ignore false positives (a.k.a. irrelevant things). In the case of Identity Security, this means analyzing user behavior analytics that enable rapid responses to anomalous or risky privileged access to infrastructure and applications.

http://bit.ly/3ZNCEQX

Thursday 3/16

5 Steps to Improve Your Cyber Attack Response (Arctic Wolf)

In the modern cybersecurity threat landscape, global experts are coming to a simple consensus: A strong security posture involves both proactive preparation in case of attack and robust response should one occur.

http://bit.ly/3ZQw8IZ

Can your SASE solution block these top malware? (Check Point)

The ability to detect and prevent never-before-seen malware is critical to closing an attacker’s window of opportunity. This is why a Secure Access Service Edge (SASE) solution focused on threat prevention is critical to defending against new malware strains.

http://bit.ly/3FpeLqQ

Friday 3/17

Protecting Your VMs with the Pure Storage vSphere Plugin Replication Manager (Pure Storage)

The Pure Storage® vSphere Plugin can now manage VM migrations. Learn more about this new feature and how to use it in your environment.

http://bit.ly/3yIdwPI

Meet recovery objectives while accelerating compliance (Veeam)

Modern data protection challenges demand an assessment of recovery strategies and the maintenance of compliance with those strategies. This could be for regulatory reasons or simply to offer assurance that the business can bounce back quickly in the event of an outage.

http://bit.ly/3lk0DYT