Monday 8/7
Prevention Is the Best Preparation for the SEC’s New Breach Disclosure Rules (CrowdStrike)
The U.S. Securities and Exchange Commission (SEC) this week voted to adopt new rules for how companies inform investors about cybersecurity concerns. The vote comes after years of gradually increasing guidance and scrutiny over companies’ handling of cybersecurity events.
https://bit.ly/3qeR0NR
The 8 Stages of the Ransomware Attack Chain (Proofpoint)
Although attackers may be constantly finding new ways to get around cybersecurity, it doesn’t mean their tactics are entirely unpredictable. That’s because every ransomware attack typically follows the same basic sequence of events. Here is a closer look at the eight stages of a successful ransomware attack.
https://bit.ly/3KqYwM7
Tuesday 8/8
Mr. Robot ft. Bryon Singh, RailWorks Corporation
https://www.gothamtg.com/blog/mr-robot
How to Implement Threat Modeling in Your DevSecOps Process (Pure Storage)
Building secure software is critical in today’s world, where cyberattacks are becoming increasingly common and sophisticated. Threat modeling is an essential tool for developers and security professionals to identify and mitigate potential security risks in software systems proactively.
https://bit.ly/45k3uTa
Wednesday 8/9
Empowering your workforce with Amazon WorkSpaces services and Microsoft 365 (AWS)
Beginning August 1, 2023, AWS End User Computing customers can use Microsoft 365 licenses through a “bring your own license” (BYOL) model on our Amazon WorkSpaces services.
https://bit.ly/45ni9wI
Impact and Mitigation Strategies of Malicious Bots in Business (F5)
Companies that depend on applications to engage with customers are at risk from malicious bots and other automated attacks.
https://bit.ly/3s58MDG
How to Create a Comprehensive Zero Trust Strategy (Fortinet)
With a comprehensive zero-trust strategy, organizations can implement robust data protection across on-premises, hybrid, and multi-cloud environments.
https://bit.ly/45hHMPC
Wednesday 8/16
WOW! ft. Bryon Singh, RailWorks Corporation
https://www.gothamtg.com/blog/wow
How To Prevent MFA Fatigue Attacks (Arctic Wolf)
In today’s complex threat landscape, MFA is often considered the minimum barrier an organization can implement and is a vital part of utilizing a Zero Trust framework. However, MFA is not impenetrable.
https://bit.ly/3sdEuPb
Operationalizing Identity Security in the Public Cloud (CyberArk)
Standardizing cloud IAM operations with CyberArk Cloud Security means establishing a consistent methodology for managing and enforcing best practices, securing access for humans and non-humans – and auditing and compliance across your cloud estate.
https://bit.ly/3YCrYEY
Thursday 8/17
Deploying Custom VIBs on vSphere 8
Sometimes with VMware solutions, you need to install a custom vSphere Installation Bundle (VIB). There are VIBs for Nvidia GPUs, storage VIBs, and many others. In this post, let’s talk about how you can use Lifecycle Manager to install VIBs, rather than messing around with the Command Line as most of the instructions would have you do.
https://www.gothamtg.com/blog/deploying-custom-vibs-on-vsphere-8
Implementing DMARC to Meet PCI DSS V4.0 Requirements (Proofpoint)
Section 5.4 of PCI DSS V4.0 states that anti-phishing mechanisms must be in place to protect your business, suppliers and financial partners against phishing attacks. Requirement 5.4.1 mandates the implementation of processes and automated mechanisms to detect and protect personnel against phishing attacks.
https://bit.ly/3QJ22FY
Solving the Data Daze: Analytics at the Speed of Business Questions (Pure Storage)
So, what happens when the data flows are not quarterly, or monthly, or even daily, but streaming in real time? The business challenges then become manifold: Talent and technologies now must be harnessed, choreographed, and synchronized to keep up with the data flows that carry and encode essential insights flowing through business processes at light speed.
https://bit.ly/44frdD5
Friday 8/18
July 2023’s Most Wanted Malware: Remote Access Trojan (RAT) Remcos Climbs to Third Place while Mobile Malware Anubis Returns to Top Spot (Check Point)
Check Point Research reported that RAT Remcos rose four places due to trojanized installers, Anubis Mobile Malware Ousted SpinOk and education/research still hardest hit.
https://bit.ly/3ElvMRT
4 New Features for Operational and IT Efficiency in Any Environment (Citrix)
With Destination: Hybrid, Citrix makes managing hybrid deployments simple and efficient. Many of our latest feature developments have been aimed at increasing operational efficiency across hybrid, cloud, and on-premises deployments.
https://bit.ly/3qAXHda