This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On September 29, 2023

Monday 9/25

10 Real-World Business Email Compromise (BEC) Scam Examples (Proofpoint)

The FBI’s Internet Crime Complaint Center reports that businesses lost more than $2.7 billion to BEC scams in 2022. That’s more than one-quarter of all the cyber crime-related financial losses for that year.

https://bit.ly/3RC1LVw

What is Alert Deafness? (Check Point)

The exponential increase in data processed by organizations means a rise in errors, failures, and vulnerabilities is expected. But with pings and dings popping up over 500 times per day (according to the International Data Corporation), developers are left with a completely unmanageable environment.

https://bit.ly/3LCOzfo

Tuesday 9/26

What’s New with Citrix – CVAD 2308 and Cloud updates (Citrix)

Citrix is bringing new features to your apps and desktops quarter after quarter. And we are just getting started as we’re rounding out the second half of the year. These past few months have come with improved security features, enhanced user experience technologies, and streamlined management capabilities.

https://bit.ly/3t8K064

Four Ways to Prevent Credential Theft and Credential-Based Attacks (Arctic Wolf)

When it comes to attack vectors, there are few as useful and widespread as credential theft. Verizon listed it as a top vector in their 2023 Data Breach Investigations Report, and Arctic Wolf Labs saw “historic compromise” as the root point of compromise for 7% of all breaches in 2022.

https://bit.ly/465MArY

Wednesday 9/27

A Wand For Each Wizard ft. Bryon Singh, RailWorks Corporation

https://www.gothamtg.com/blog/a-wand-for-each-wizard

Unified Management Is the Key to Single-Vendor SASE (Fortinet)

SASE is one of the first truly converged networking and security solutions that have gained mainstream popularity. But, one of the biggest challenges facing customers is understanding all of the networking elements and cloud-delivered security services that work together to provide all SASE features across the entire hybrid network.

https://bit.ly/46uFhKv

Thursday 9/28

DSPM Deep Dive: Debunking Data Security Myths (Varonis)

Data security posture management provides visibility into where sensitive data is located, who has access to it, how it's being used, and how the security controls and permissions are configured on the data stores or applications hosting the data. For anybody familiar with Varonis, this should ring a bell.

https://bit.ly/3ESUMzR

Data Storage, Pure and Simple (Pure Storage)

The all-flash data center isn’t just a vision—it’s a reality, and we’re leading the charge. Do great things with data when you uncomplicate your data storage forever with Pure Storage. Get inspired. Push transformation further. Embrace simplicity with Pure.

https://bit.ly/3tblzVB

Cloud Identity Security Success: 3 Critical Factors (CyberArk)

Considering that no one key to a successful cloud identity security program exists, we should look beyond just pure technology, features and capabilities. Instead, we should consider the real-life challenges of implementing a large-scale, multi-cloud and multi-system environment.

https://bit.ly/3ZxT0hk

Friday 9/29

How to Setup Email-based Discovery for Citrix Workspace in Citrix Cloud

Email-based discovery in the Citrix Workspace app allows users to setup Workspace using only their email address. The benefit of this feature is that a user does not have to enter or remember any server URLs to access their Citrix resources.

https://www.gothamtg.com/blog/email-based-discovery-for-citrix-workspace-in-citrix-cloud

Combating Ransomware Attacks: Insights from Unit 42 Incident Response (Palo Alto Networks)

It's increasingly common to hear of a major corporation, educational institution or local government falling victim to a ransomware attack, in addition to the incidents that make national headlines. These attacks have far-reaching implications, affecting everything from critical public services, like hospitals, disruptions in supply chains, and even taking critical gas pipelines offline.

https://bit.ly/46rNIpK

Fortify your cloud security with Wiz as it integrates with Microsoft Sentinel (Wiz)

Lock down your cloud infrastructure with the new Wiz integration with Microsoft Sentinel. Gain full context, support thorough investigations, and automate your response for ultimate security.

https://bit.ly/3LGv1GQ