This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On August 25, 2023

Monday 8/21

How to Protect Your Cloud Environment From Today’s Top 5 Threats (Varonis)

Cloud environments are evolving quickly, and so are the threats looking to compromise them. No matter what the risk is or what the attack vector is, the goal is always the same: threats are after the data.

Five Things To Know About PCI DSS 4.0 Authentication Requirements (HYPR)

PCI DSS 4.0, introduces more than 60 new or updated requirements, with new directives around passwords and multi-factor authentication (MFA) among the most consequential.

Tuesday 8/22

Join Gotham CTO, Ken Phelan, and Votiro CTO and Founder, Aviv Grafi, on Thursday, September 7, at 9:30 AM for a CTO Tech Talk discussing security risks in today’s virtual landscape and zero-trust strategy.

See the link below for registration details.

Three Ways to Enhance Your Cloud Security with External Attack Surface Management (CrowdStrike)

CrowdStrike data shows that 25% of cloud assets in the U.S. are exposed to severe vulnerabilities — securing the cloud starts with knowing your risk

Verify You Are Human (So We Can Steal Your Credentials) (Check Point)

It is important to note that the same mechanisms that make Turnstile a user-friendly CAPTCHA alternative also present a potential risk if exploited by malicious actors.

Wednesday 8/23

How Humans Cause and Can Prevent Data Breaches (Arctic Wolf)

Threat actors prey on users because they hold the keys to the castle. They have credentials that can be stolen, especially with poor password hygiene, their endpoints have access to a variety of applications and assets, they often have privileged access to sensitive information, and, unfortunately, they often aren’t well trained in preventing these kinds of attacks.

SEC Rule Sparks Reimagining of Cybersecurity Operations (Palo Alto Networks)

Regulators around the globe are requiring that companies report more about cyber incidents in defined sets of time and, in doing so, are illuminating a truth we have long known – organizations must embrace a new approach to implementing security solutions to defeat motivated, well-financed and ever more sophisticated cyber attackers.

Thursday 8/24

Advanced Data Identification in DLP: What Is EDM, IDM, OCR and AI-Powered Classification? (Proofpoint)

Data loss prevention (DLP) can help teams keep an eye out for data policy violations and quickly respond to incidents where there’s a potential for data loss. DLP alerts can provide early warnings of cyber attacks or insider threats and prevent sensitive data from being lost or stolen.

Desktop Image Lifecycle Management – Part 1 (Nerdio)

Deciding to shift to Azure Virtual Desktop (AVD) is just the first step of the journey. The next step is understanding how to get the most out of this solution, and how it can help you to streamline your efforts to maintain and update the resources that underpin the end-user experience in the environments you support.

Friday 8/25

My VMware vSphere 8 Home Lab

In my opinion, home labs are awesome. One of the best ways for you to learn software is to actually run it in your house on a home lab and have the ability to test out solutions, features, upgrades, and break fixes without having to worry about impacting your user base at work.

New FortiGate NGFWs Deliver AI-Powered Security for Sustainable Data Centers (Fortinet)

Next-generation firewalls (NGFWs) securing the data center must deliver high-performance capabilities and comprehensive threat protection and coordination across the entire infrastructure. And with the rise of sustainability goals, this must be done in an energy-efficient manner.

Generative AI Security: Preventing Microsoft Copilot Data Exposure (Varonis)

It's critical to have a sense of your data security posture before your Copilot rollout. Copilot is likely to become generally available early next year, so now is a great time to get your security controls in place.