Monday 7/24
Five Ways to Secure External Identities (CyberArk)
The cast of characters playing essential roles in driving your high-stakes initiatives continues to grow in number, scope and risk. Keeping their identities secure is essential for preventing third-party breaches and attacks – and for protecting everything these external B2B users are building for your enterprise.
https://bit.ly/43FTGSj
Ransomware Roundup - Cl0p (Fortinet)
The Cl0p ransomware appears to be a descendent (or variant) of another ransomware, “CryptoMix”, which also has an association with FIN11.
https://bit.ly/3OpnrlS
Tuesday 7/25
Um, Yeah, No! ft. Bryon Singh, RailWorks Corporation
https://www.gothamtg.com/blog/um-yeah-no
Strengthening your Citrix security, one feature at a time (Citrix)
New features have rolled out for a number of our solutions, including Anti-DLL injection and granular security controls for App Protection, an on-premises version of Secure Private Access, and upgrade scheduling and on-premises upgrades for Session Recording.
https://bit.ly/3NZCP6Q
Modern API Security Risks and Challenges Solved with Web App and API Protection (WAAP) Solutions (F5)
Modern apps require an advanced set of capabilities in order to sufficiently protect their entire threat surface. Web app firewalls (WAFs) still play a role, but as apps evolve and APIs persist, more is needed to monitor, track, and secure the entire app surface including a growing web of API connections.
https://bit.ly/3OqPxgq
Wednesday 7/26
2023 Verizon Data Breach Investigations (DBIR) Top 3 Takeaways (Proofpoint)
According to Verizon’s 16th annual Data Breach Investigation Report (DBIR), business email compromise (BEC) is the largest cybersecurity threat to companies today. And data from the recent FBI Internet Crime Complaint Center report backs this up.
https://bit.ly/43K4zCD
What Are Immutable Backups? (Veeam)
Immutability remains a hot topic, especially around ransomware, with many vendors and organizations adopting immutable technologies for cyber resiliency. So, what exactly are immutable backups and why should you use them in your data protection strategy?
https://bit.ly/44HxoRk
Thursday 7/27
Exploring VMware Clustered VMDKs
With the release of vSphere 7.0 in March 2020, VMware introduced Clustered VMDKs. This enabled a special type of datastore that allowed for shared VMDKs to live on it. This allowed clients to create multiple VMDK files on a single LUN and allow multiple VMs to access them simultaneously
https://www.gothamtg.com/blog/exploring-vmware-clustered-vmdks
4 Essential Elements for a Comprehensive Cloud Security Stack (Check Point)
While IT teams are adopting the cloud as a way to remain agile and scalable, this also means they are more vulnerable to malicious attacks. In 2022 alone, the average cost of a data breach in the US alone was $9.44 million.
https://bit.ly/3Ki5iUF
AI Readiness Is Not an Option (Pure Storage)
Businesses need to leverage AI for business success, sustainability, and survivability. AI readiness is not an option but an imperative for success now and into the future.
https://bit.ly/3OwF9E5
Friday 7/28
Phishing: A Primer on How to Protect Your Organization (Arctic Wolf)
Among the reported complaints to the FBI’s Internet Crime Complaint Center in 2022, phishing is, by far, the most common crime type reported, with nearly 38% of complaints being phishing.
https://bit.ly/3Kk9SBH
5 Key Things To Know On The SEC Cyber Disclosure Rules (CRN)
With its adoption of two new rules around cyber disclosure Wednesday, the Securities and Exchange Commission has enacted the most broad-sweeping regulations the U.S. has ever seen around cybersecurity.
https://bit.ly/3Y8ytzb