Monday 11/27
Business Email Compromise Attacks (BEC) Keep Growing — Here’s How to Increase Your BEC Cybersecurity (Arctic Wolf)
It’s clear that Business Email Compromise (BEC) is quickly becoming a top tactic for threat actors, and they have become increasingly adept at not only spoofing email addresses but taking over accounts altogether once they are compromised — all with the goal of tricking users and stealing funds.
https://arcticwolf.com/resources/blog/business-email-compromise-major-boon-to-threat-actors/
Zero Trust Security in Action: Meet the New Check Point CloudGuard (Check Point)
To truly embrace a ‘never trust, always verify’ approach, it is imperative to implement a least privilege framework across your cloud environments and prevent the exposure of keys and secrets within code.
https://blog.checkpoint.com/securing-the-cloud/zero-trust-security-in-action-meet-the-new-check-point-cloudguard/
Tuesday 11/28
Skeleton Keys and Local Admin Passwords: A Cautionary Tale (CyberArk)
In today’s complex enterprise landscape, the prevalent use of what can be termed as “modern digital skeleton keys” – local administrator accounts – poses a significant risk to organizational cybersecurity.
https://www.cyberark.com/resources/blog/skeleton-keys-and-local-admin-passwords-a-cautionary-tale
5 Tips to Defend Against Access Brokers This Holiday Season (CrowdStrike)
Access brokers are decking the halls with advanced social engineering scams and vulnerability exploits to blend in with normal users and make a quick profit by selling credentials and other access methods.
https://www.crowdstrike.com/blog/five-holiday-tips-to-defend-against-access-brokers/
Wednesday 11/29
Hybrid Multi-Cloud Strategies and Performance Management (F5)
Having a secure multi-cloud networking framework as an operational collaborative platform will help the enterprise operations and security teams connect to any environment. The goal: To seamlessly deliver and secure applications and APIs on that connected environment.
https://www.f5.com/company/blog/hybrid-multi-cloud-strategies-performance-management
Proofpoint's 2024 Predictions: Brace for Impact (Proofpoint)
As we reflect on 2023, it becomes evident that cyber threat actors possess the capabilities and resources to adapt their tactics in response to increased security measures such as multi-factor authentication (MFA). Looking ahead to 2024, the trend suggests that threats will persistently revolve around humans, compelling defenders to take a different approach to breaking the attack chain.
https://www.proofpoint.com/us/blog/ciso-perspectives/proofpoints-2024-predictions-brace-impact
Thursday 11/30
How To Properly Allocate Resources In Azure Virtual Desktop (Nerdio)
Azure Virtual Desktop consists of multiple Azure resources. They must be placed in the appropriate locations for maximum availability and performance to get the best end-user experience. This blog post will discuss the resources relevant to Azure Virtual Desktop (AVD) and some related considerations for effective and efficient IT management.
https://getnerdio.com/resources/how-to-properly-allocate-resources-in-azure-virtual-desktop/
Friday 12/1
Migration Guide for Customers Using Preview Version of Citrix Workspace Custom Domain (Citrix)
With the General Availability of custom domain released in November 2023, the older Tech Preview version (V1) will be deprecated on January 31, 2024. As a result, custom URLs created using the older tech previewed version (V1) will no longer be available post deprecation date.
https://www.citrix.com/blogs/2023/11/29/migration-guide-for-customers-using-preview-version-of-citrix-workspace-custom-domain/
Multiple Clouds vs. Multicloud: What’s the Difference and Why Does It Matter? (Nutanix)
With the multiple cloud approach quickly becoming the de facto standard for modern enterprises, the term “multicloud” is often used to describe this approach, but that can be a bit of a misnomer.
https://www.nutanix.com/blog/multiple-clouds-vs-multicloud-what-is-the-difference