New Perimeters—Identity Threats Are the New Attack Surface (Proofpoint)
Cyber criminals can bypass standard perimeter defenses with minimal effort or technical know-how by targeting unmanaged and misconfigured identities. Service accounts, local and shadow admins and cached credentials often slip through the net of privilege and password security tools.
Purity//FA 6.4.10: NFS 4.1 Support and Ransomware Protection Enhancements (Pure Storage)
The latest release of Purity//FA version 6.4.10 brings some important new features for Unified Block and File customers in addition to new safeguards with SafeMode.
OriginBotnet Spreads via Malicious Word Document (Fortinet)
In August, FortiGuard Labs obtained a Word document containing a malicious URL designed to entice victims to download a malware loader. This loader employs a binary padding evasion strategy that adds null bytes to increase the file's size to 400 MB.
Check Point to Acquire Atmosec, an Innovative SaaS Security Vendor, as part of its Strategy to Deliver the Most Secure SASE Solution (Check Point)
The technology will allow organizations to prevent cyberattacks on their SaaS ecosystem: discover and disconnect malicious applications, prevent communication with risky 3rd party applications and fix SaaS misconfigurations
ICYMI: Gotham CTO Ken Phelan and Votiro CTO and Founder Aviv Grafi met earlier this month for a discussion on the cybersecurity landscape and zero-trust strategy. See the link below for the full video.
What's Your Password ft. Bryon Singh, RailWorks Corporation
When to Use Azure Site Recovery with Azure Virtual Desktop (Nerdio)
Azure Site Recovery (ASR) is a good option for systems that require low RPO and RTO including AVD host pools that can’t be quickly rebuilt at a recovery region. However, not all deployments require protecting Azure Virtual Desktop with ASR.
Amid Sharp Increase in Identity-Based Attacks, CrowdStrike Unveils New Threat Hunting Capability (CrowdStrike)
New managed identity threat hunting service addresses rapid increase in Kerberoasting and other identity-based attacks.
Identity Verification vs. Authentication (HYPR)
Identity verification and identity authentication are both essential elements of a comprehensive identity security strategy. While they sound similar, they serve very different, but interconnected, purposes.
Building Resilience: Email Attacks, AI and Microsoft (Proofpoint)
And while the cloud—and its potential for vulnerability—is nothing new, cyber criminals are continuously developing innovative ways to target this growing attack surface. To protect their organisations, security teams must understand how to break the email attack chain as early and effectively as possible.
Mastering Your Hybrid Cloud Strategy (Veeam)
While many didn’t “plan” or “strategize” to have hybrid cloud architectures, they have become indispensable in the modern business landscape. Many organizations require agility and scalability to quickly adapt to changing market conditions, handle fluctuating workloads and accelerate innovation.
Supercloud Simplicity Via Multi-Cloud Networking (F5)
With hybrid IT the reality, and many organizations employing multiple public clouds for AI, security, and global reach, the need for a solution to simplify operations is urgent. Supercloud proposes to do just that.