This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On July 28, 2023

Monday 7/24

Five Ways to Secure External Identities (CyberArk)

The cast of characters playing essential roles in driving your high-stakes initiatives continues to grow in number, scope and risk. Keeping their identities secure is essential for preventing third-party breaches and attacks – and for protecting everything these external B2B users are building for your enterprise.

https://bit.ly/43FTGSj

Ransomware Roundup - Cl0p (Fortinet)

The Cl0p ransomware appears to be a descendent (or variant) of another ransomware, “CryptoMix”, which also has an association with FIN11.

https://bit.ly/3OpnrlS

Tuesday 7/25

Um, Yeah, No! ft. Bryon Singh, RailWorks Corporation

https://www.gothamtg.com/blog/um-yeah-no

Strengthening your Citrix security, one feature at a time (Citrix)

New features have rolled out for a number of our solutions, including Anti-DLL injection and granular security controls for App Protection, an on-premises version of Secure Private Access, and upgrade scheduling and on-premises upgrades for Session Recording.

https://bit.ly/3NZCP6Q

Modern API Security Risks and Challenges Solved with Web App and API Protection (WAAP) Solutions (F5)

Modern apps require an advanced set of capabilities in order to sufficiently protect their entire threat surface. Web app firewalls (WAFs) still play a role, but as apps evolve and APIs persist, more is needed to monitor, track, and secure the entire app surface including a growing web of API connections.

https://bit.ly/3OqPxgq

 

Wednesday 7/26

2023 Verizon Data Breach Investigations (DBIR) Top 3 Takeaways (Proofpoint)

According to Verizon’s 16th annual Data Breach Investigation Report (DBIR), business email compromise (BEC) is the largest cybersecurity threat to companies today. And data from the recent FBI Internet Crime Complaint Center report backs this up.

https://bit.ly/43K4zCD

What Are Immutable Backups? (Veeam)

Immutability remains a hot topic, especially around ransomware, with many vendors and organizations adopting immutable technologies for cyber resiliency. So, what exactly are immutable backups and why should you use them in your data protection strategy?

https://bit.ly/44HxoRk

Thursday 7/27

Exploring VMware Clustered VMDKs

With the release of vSphere 7.0 in March 2020, VMware introduced Clustered VMDKs. This enabled a special type of datastore that allowed for shared VMDKs to live on it. This allowed clients to create multiple VMDK files on a single LUN and allow multiple VMs to access them simultaneously

https://www.gothamtg.com/blog/exploring-vmware-clustered-vmdks

4 Essential Elements for a Comprehensive Cloud Security Stack (Check Point)

While IT teams are adopting the cloud as a way to remain agile and scalable, this also means they are more vulnerable to malicious attacks. In 2022 alone, the average cost of a data breach in the US alone was $9.44 million.

https://bit.ly/3Ki5iUF

AI Readiness Is Not an Option (Pure Storage)

Businesses need to leverage AI for business success, sustainability, and survivability. AI readiness is not an option but an imperative for success now and into the future.

https://bit.ly/3OwF9E5

Friday 7/28

Phishing: A Primer on How to Protect Your Organization (Arctic Wolf)

Among the reported complaints to the FBI’s Internet Crime Complaint Center in 2022, phishing is, by far, the most common crime type reported, with nearly 38% of complaints being phishing.

https://bit.ly/3Kk9SBH

5 Key Things To Know On The SEC Cyber Disclosure Rules (CRN)

With its adoption of two new rules around cyber disclosure Wednesday, the Securities and Exchange Commission has enacted the most broad-sweeping regulations the U.S. has ever seen around cybersecurity.

https://bit.ly/3Y8ytzb