Monday 9/25
10 Real-World Business Email Compromise (BEC) Scam Examples (Proofpoint)
The FBI’s Internet Crime Complaint Center reports that businesses lost more than $2.7 billion to BEC scams in 2022. That’s more than one-quarter of all the cyber crime-related financial losses for that year.
https://bit.ly/3RC1LVw
What is Alert Deafness? (Check Point)
The exponential increase in data processed by organizations means a rise in errors, failures, and vulnerabilities is expected. But with pings and dings popping up over 500 times per day (according to the International Data Corporation), developers are left with a completely unmanageable environment.
https://bit.ly/3LCOzfo
Tuesday 9/26
What’s New with Citrix – CVAD 2308 and Cloud updates (Citrix)
Citrix is bringing new features to your apps and desktops quarter after quarter. And we are just getting started as we’re rounding out the second half of the year. These past few months have come with improved security features, enhanced user experience technologies, and streamlined management capabilities.
https://bit.ly/3t8K064
Four Ways to Prevent Credential Theft and Credential-Based Attacks (Arctic Wolf)
When it comes to attack vectors, there are few as useful and widespread as credential theft. Verizon listed it as a top vector in their 2023 Data Breach Investigations Report, and Arctic Wolf Labs saw “historic compromise” as the root point of compromise for 7% of all breaches in 2022.
https://bit.ly/465MArY
Wednesday 9/27
A Wand For Each Wizard ft. Bryon Singh, RailWorks Corporation
https://www.gothamtg.com/blog/a-wand-for-each-wizard
Unified Management Is the Key to Single-Vendor SASE (Fortinet)
SASE is one of the first truly converged networking and security solutions that have gained mainstream popularity. But, one of the biggest challenges facing customers is understanding all of the networking elements and cloud-delivered security services that work together to provide all SASE features across the entire hybrid network.
https://bit.ly/46uFhKv
Thursday 9/28
DSPM Deep Dive: Debunking Data Security Myths (Varonis)
Data security posture management provides visibility into where sensitive data is located, who has access to it, how it's being used, and how the security controls and permissions are configured on the data stores or applications hosting the data. For anybody familiar with Varonis, this should ring a bell.
https://bit.ly/3ESUMzR
Data Storage, Pure and Simple (Pure Storage)
The all-flash data center isn’t just a vision—it’s a reality, and we’re leading the charge. Do great things with data when you uncomplicate your data storage forever with Pure Storage. Get inspired. Push transformation further. Embrace simplicity with Pure.
https://bit.ly/3tblzVB
Cloud Identity Security Success: 3 Critical Factors (CyberArk)
Considering that no one key to a successful cloud identity security program exists, we should look beyond just pure technology, features and capabilities. Instead, we should consider the real-life challenges of implementing a large-scale, multi-cloud and multi-system environment.
https://bit.ly/3ZxT0hk
Friday 9/29
How to Setup Email-based Discovery for Citrix Workspace in Citrix Cloud
Email-based discovery in the Citrix Workspace app allows users to setup Workspace using only their email address. The benefit of this feature is that a user does not have to enter or remember any server URLs to access their Citrix resources.
https://www.gothamtg.com/blog/email-based-discovery-for-citrix-workspace-in-citrix-cloud
Combating Ransomware Attacks: Insights from Unit 42 Incident Response (Palo Alto Networks)
It's increasingly common to hear of a major corporation, educational institution or local government falling victim to a ransomware attack, in addition to the incidents that make national headlines. These attacks have far-reaching implications, affecting everything from critical public services, like hospitals, disruptions in supply chains, and even taking critical gas pipelines offline.
https://bit.ly/46rNIpK
Fortify your cloud security with Wiz as it integrates with Microsoft Sentinel (Wiz)
Lock down your cloud infrastructure with the new Wiz integration with Microsoft Sentinel. Gain full context, support thorough investigations, and automate your response for ultimate security.
https://bit.ly/3LGv1GQ