This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On September 15, 2023

Monday 9/11

New Perimeters—Identity Threats Are the New Attack Surface (Proofpoint)

Cyber criminals can bypass standard perimeter defenses with minimal effort or technical know-how by targeting unmanaged and misconfigured identities. Service accounts, local and shadow admins and cached credentials often slip through the net of privilege and password security tools.

https://bit.ly/488aQeF

Purity//FA 6.4.10: NFS 4.1 Support and Ransomware Protection Enhancements (Pure Storage)

The latest release of Purity//FA version 6.4.10 brings some important new features for Unified Block and File customers in addition to new safeguards with SafeMode.

https://bit.ly/3PzgfEb

Tuesday 9/12

OriginBotnet Spreads via Malicious Word Document (Fortinet)

In August, FortiGuard Labs obtained a Word document containing a malicious URL designed to entice victims to download a malware loader. This loader employs a binary padding evasion strategy that adds null bytes to increase the file's size to 400 MB.

https://bit.ly/3RjbiRs

Check Point to Acquire Atmosec, an Innovative SaaS Security Vendor, as part of its Strategy to Deliver the Most Secure SASE Solution (Check Point)

The technology will allow organizations to prevent cyberattacks on their SaaS ecosystem: discover and disconnect malicious applications, prevent communication with risky 3rd party applications and fix SaaS misconfigurations

https://bit.ly/3Zh75zi

Wednesday 9/13

ICYMI: Gotham CTO Ken Phelan and Votiro CTO and Founder Aviv Grafi met earlier this month for a discussion on the cybersecurity landscape and zero-trust strategy. See the link below for the full video.

https://t.co/cm7NIx923n

What's Your Password ft. Bryon Singh, RailWorks Corporation

https://www.gothamtg.com/blog/whats-your-password

When to Use Azure Site Recovery with Azure Virtual Desktop (Nerdio)

Azure Site Recovery (ASR) is a good option for systems that require low RPO and RTO including AVD host pools that can’t be quickly rebuilt at a recovery region. However, not all deployments require protecting Azure Virtual Desktop with ASR.

https://bit.ly/487whwt

Thursday 9/14

Amid Sharp Increase in Identity-Based Attacks, CrowdStrike Unveils New Threat Hunting Capability (CrowdStrike)

New managed identity threat hunting service addresses rapid increase in Kerberoasting and other identity-based attacks.

https://bit.ly/3LhSXA3

Identity Verification vs. Authentication (HYPR)

Identity verification and identity authentication are both essential elements of a comprehensive identity security strategy. While they sound similar, they serve very different, but interconnected, purposes. 

https://bit.ly/3Lnvmyc

Building Resilience: Email Attacks, AI and Microsoft (Proofpoint)

And while the cloud—and its potential for vulnerability—is nothing new, cyber criminals are continuously developing innovative ways to target this growing attack surface. To protect their organisations, security teams must understand how to break the email attack chain as early and effectively as possible.

https://bit.ly/48iJORZ

Friday 9/15

Mastering Your Hybrid Cloud Strategy (Veeam)

While many didn’t “plan” or “strategize” to have hybrid cloud architectures, they have become indispensable in the modern business landscape. Many organizations require agility and scalability to quickly adapt to changing market conditions, handle fluctuating workloads and accelerate innovation.

https://bit.ly/3r79lNf

Supercloud Simplicity Via Multi-Cloud Networking (F5)

With hybrid IT the reality, and many organizations employing multiple public clouds for AI, security, and global reach, the need for a solution to simplify operations is urgent. Supercloud proposes to do just that.

https://bit.ly/44NRys4