The Evolving Landscape of Distributed Application Security: Beyond Network Firewalls (F5)
With the dispersion of application services across highly distributed environments, security has become an infinitely more complex endeavor.
The Seven Types of Non-human Identities to Secure (CyberArk)
Being aware of all the different identity types in your organization and understanding all the different security needs that must be considered are the first steps to building a cohesive program to manage and secure these identities and the secrets they use.
Pardon Me. Would You Have Any (Grey Poupon) Data?
Mitigating Risks in Cloud Native Applications (Check Point)
As organizations move their operations to the cloud, they face a difficult challenge in ensuring secure configurations and consistent security posture across multiple cloud services and platforms.
If you haven’t read tech news in the last week or two, would you have thought twice about clicking on these links if they were embedded into an email?
Improve Threat Protection Across Email and Endpoints with Proofpoint and Microsoft Defender (Proofpoint)
Threat actors are constantly changing their tactics and techniques. A multi-layered approach to defense is the best way to keep up with today’s increasingly sophisticated and quickly evolving threats.
CrowdStrike Advances the Use of AI to Predict Adversary Behavior and Significantly Improve Protection (CrowdStrike)
Machine learning and AI are powerful tools for detecting emerging patterns in data and conducting in-depth behavioral analysis to understand adversary intents and objectives.
FSLogix Application Masking (Nerdio)
As MSPs and IT professionals navigate the complexities of application management, understanding how FSLogix Application Masking works and its practical implementation becomes essential.
ESG Research Shows Why Data Analytics Maturity Matters (Pure Storage)
Many organizations have expanded their analytics capabilities by capturing “big data” to explore new business capabilities. Now, some want to accelerate those capabilities by moving beyond experimentation with analytics toward more mature investments and capabilities.
Gotham is excited to announce that we’ve been named to TheChannelCo’s CRN Solution Provider 500 list. The Solution Provider 500 is the industry standard for recognizing the highest performing strategic service providers and IT consultants.
See the full list here: https://www.crn.com/sp-500/sp2023.htm
What Is PCI DSS And Why Is It Important? (Arctic Wolf)
Created in 2004, the PCI DSS encompasses twelve requirements for security management, policies, procedures, network architecture, software design, and other critical protective measures.
The Security Compromise that Comes with Windows 10 End of Support (CrowdStrike)
On April 27, 2023, Microsoft announced the end of support for Windows 10, making 1022H2 the final version of the operating system. In the announcement, Microsoft outlined that Windows 10 will continue to have monthly security updates until October 14, 2025
Why Your Branch of the Future Needs Next-Gen SD-WAN and Prisma SASE (Palo Alto Networks)
In the post-pandemic world, organizations are harnessing the power of hybrid work and digitization to unlock productivity and new business models. This has meant an unprecedented level of digitization to accommodate distributed workforce, applications and an explosion in the number of devices.
What Is a Computer Worm? (Check Point)
A computer worm is malware that is capable of spreading by itself with no human interaction. Wannacry is an example of a computer worm that spread by exploiting a vulnerability in Windows SMB servers.
Anybody Have Any Data? Go Phish!
What’s New with Citrix — CVAD 2305 and Cloud Updates (Citrix)
Digital Business Maps to Observability and Automation (F5)
An innovation receiving a lot of attention lately is generative AI. But AI, powered by machine learning, is built upon the foundation of automation. And while you can automate manual processes and repetitive tasks, the success and force multiplier of automation isn’t truly realized without its counterpart, observability.
Ghost Sites: Stealing Data From Deactivated Salesforce Communities (Varonis)
Varonis Threat Labs discovered that improperly deactivated Salesforce "ghost sites” remain accessible and vulnerable to risk.
Purity//FA 6.4 Release Highlights (Pure Storage)
Released on May 23, 2023, Purity//FA 6.4.5 includes feature enhancements and upgrades, like non-disruptive workload mobility using ActiveWorkload, more flexible disaster recover with nearly half a million snapshot replication, and expanded networking with increases to the VLAN tag and subnet interface limits.