This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On December 08, 2023

Monday 12/4

Check Point Research Navigates Outlook’s Security Landscape: The Obvious, the Normal, and the Advanced (Check Point)

Check Point Research (CPR) conducted a comprehensive analysis on ‘Outlook’, the desktop app in the Microsoft office suite, providing deeper insights into attack vectors, aiding both users and the security industry in understanding and mitigating potential risks.

https://blog.checkpoint.com/security/check-point-research-navigates-outlooks-security-landscape-the-obvious-the-normal-and-the-advanced/

Enhancements to Proofpoint Federal Solutions: A New AI/ML Detection Engine, Updates to the TAP Dashboard and More (Proofpoint)

Federal agency missions are under constant attack. And agencies are faced with a daunting task: They must implement measures that protect vital data yet still enable their employees to carry out their missions. Proofpoint can help.

https://www.proofpoint.com/us/blog/email-and-cloud-threats/enhancements-federal-solutions

Tuesday 12/5

3 ways Citrix supported on-premises deployments in 2023 (Citrix)

Over the course of this year, we have continued to bolster security capabilities beyond virtual apps and desktops. That’s why we introduced Citrix Secure Private Access for your IT-managed on-premises environments.

https://www.citrix.com/blogs/2023/11/21/3-ways-citrix-supported-on-premises-deployments-in-2023/

Pure Storage and Veeam Partner for Unrivaled Data Protection with Unbeatable Economics (Pure Storage)

The partnership between Pure Storage and Veeam has sparked a new era in unrivaled data protection, offering unparalleled security to prevent data loss, minimal downtime during disruptions, and accelerated recovery so you can get back to business faster than ever.

https://blog.purestorage.com/solutions/pure-storage-and-veeam-partner-for-unrivaled-data-protection-with-unbeatable-economics/

Wednesday 12/6

Reduce Compliance Complexities by Securing All Identities (CyberArk)

While foundational PAM controls and reporting will always be essential, now you must apply the requirements to a broader range of human and non-human identities across any environment.

https://www.cyberark.com/resources/blog/reduce-compliance-complexities-by-securing-all-identities

State of Application Strategy: A Decade of Data (F5)

Consistent security across hybrid locations and app architectures has been a top challenge since 2018 where it steadfastly remains today. Organizations are looking to consistently deploy security across their hybrid estate that meets the many regulatory requirements in which global organizations operate.

https://www.f5.com/company/blog/state-of-app-strategy-2023-a-decade-of-data

Thursday 12/7

Tracking Cybersecurity Progress at Industrial Companies (Fortinet)

For an increasing number of companies, the risk of cyberattacks has moved from theoretical to real, so it shouldn’t be a surprise that more manufacturers are focusing on cybersecurity now. In the past few years, companies in multiple industries have been targeted with high-profile attacks on food processing, consumer packaged goods, and energy companies.

https://www.fortinet.com/blog/industry-trends/cybersecurity-progress-at-industrial-companies

What Is EDR Security and How Does It Fit into Your Cybersecurity Strategy? (Arctic Wolf)

New variations such as extended detection and response (XDR) and managed endpoint detection and response (MDR or Managed EDR) have grown and almost taken over what was once the leading detection and response solution.

https://arcticwolf.com/resources/blog/what-is-edr-and-how-does-it-fit-into-your-security-strategy/

Friday 12/8

How Malicious Insiders Use Known Vulnerabilities Against Their Organizations (CrowdStrike)

CrowdStrike Intelligence has observed insider threats achieve their goals through the exploitation of known vulnerabilities. While these activities are hard to detect, not all is doom and gloom.

https://www.crowdstrike.com/blog/how-malicious-insiders-use-known-vulnerabilities-against-organizations/

Raftt is Now Part of Wiz! Together We Are Empowering Developers. (WIZ)

Wiz is committed to building a solution that security and development teams want. With the acquisition of Raftt, we’re gaining velocity on that journey.

https://www.wiz.io/blog/wiz-acquires-raftt