This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On March 01, 2024

Monday 2/19

The State of Security in 2024: The Bad Guys Love AI Too (Pure Storage)

AI is allowing the bad guys to scale their attack campaigns. AI is also opening the door for newbie attackers who need little knowledge of coding to launch effective campaigns. Here’s what’s happening right now in security, and why these trends will likely dominate the rest of this year.

https://blog.purestorage.com/perspectives/10-security-trends-and-predictions/

The Ins and Outs of Data Privacy, Part 1: The Importance—and Growing Complexity—of Ensuring Data Privacy (Proofpoint)

Businesses can’t afford missteps when it comes to keeping sensitive data safe. Companies everywhere are under pressure to meet strict data privacy laws that promote data security and data privacy. Noncompliance can be costly. Hefty fines and market loss are common.

https://www.proofpoint.com/us/blog/information-protection/data-privacy-laws-regulations

Tuesday 2/20

All Cried Out ft. Bryon Singh, RailWorks Corporation

https://www.gothamtg.com/blog/all-cried-out

Key Findings from CrowdStrike’s 2024 State of Application Security Report (CrowdStrike)

As organizations shift their applications and operations to the cloud and increasingly drive revenues through software, cloud-native applications and APIs have emerged among the greatest areas of modern security risk.

https://www.crowdstrike.com/blog/key-findings-crowdstrike-2024-state-of-application-security-report/

Wednesday 2/21

Understanding and Responding to Ransomware (Arctic Wolf)

According to Arctic Wolf’s State of Cybersecurity 2023 Trends Report, 48% of organizations view ransomware as the top attack vector concern. A concern comes with just cause, as the Arctic Wolf Labs 2024 Threats Report showed 48.6% of incidents investigated by Arctic Wolf were ransomware attacks.

https://arcticwolf.com/resources/blog/how-ransomware-works/

Rethinking Cybersecurity: Why Platform Consolidation is the Future (Votiro)

With its exponential growth and the prevalence of artificial intelligence and machine learning, the digital age has ushered in sophisticated cybersecurity threats, making the online ecosystem a high-stakes battleground.

https://votiro.com/blog/rethinking-cybersecurity-why-platform-consolidation-is-the-future/

Thursday 2/22

5 Essential Components of a Cloud DLP Solution (Palo Alto Networks)

Data loss prevention (DLP) is a security strategy and set of associated tools used to protect organizations from data breaches and other threats to sensitive data. DLP provides a crucial piece to the cybersecurity puzzle because most organizations store data that must remain private to comply with regulations, protect customers' data privacy, or prevent trade secrets from leaking.

https://www.paloaltonetworks.com/blog/prisma-cloud/dlp-components-data-loss-prevention/

SASE Survey Reveals User Experience Is Top of Mind (Check Point)

The results are in: end user experience is everything when it comes to SASE. That was the primary feedback from 650 security professionals we surveyed regarding SASE adoption. A full 71% put end user experience as their top concern.

https://blog.checkpoint.com/security/sase-survey-reveals-user-experience-is-top-of-mind/

Monday 2/26

10 Ways the Pure Storage Data Platform Uncomplicates Data Storage, Forever (Pure Storage)

Balancing innovation with the need to constantly update infrastructures to support it is one of the biggest enterprise IT headaches, but it doesn’t have to be. Here are 10 ways Pure Storage can uncomplicate your data storage, forever.

https://blog.purestorage.com/perspectives/10-ways-the-pure-storage-data-platform-uncomplicates-data-storage-forever/

Guardians of the Digital Realm: How to Protect Yourself from Social Engineering (Proofpoint)

In social engineering attacks, bad actors exploit psychological principles like trust, the fear of missing out, authority and the desire to be helpful. When you and your users learn to recognize these triggers, you can build a strong defense.

https://www.proofpoint.com/us/corporate-blog/post/five-ways-prevent-social-engineering-attacks

Tuesday 2/27

The results are in! Gotham Technology Group is a Great Place to Work for the fourth year in a row! Click the link below to visit our company profile and learn what makes Gotham stand out.

https://www.greatplacetowork.com/certified-company/7025230

Introducing more access options with Multi-Workspace URL! (Citrix)

Enterprises want  to make access as easy as possible while maintaining security and delivering the right resources. This is often done by separating the access layer into different URLs. Though secure, this process takes time for the administrators to implement to ensure they are maintaining the required security and resources for each use case.

https://www.citrix.com/blogs/2024/02/22/introducing-more-access-options-with-multi-workspace-url/

Key Findings from CrowdStrike’s 2024 State of Application Security Report (CrowdStrike)

As organizations shift their applications and operations to the cloud and increasingly drive revenues through software, cloud-native applications and APIs have emerged among the greatest areas of modern security risk.

https://www.crowdstrike.com/blog/key-findings-crowdstrike-2024-state-of-application-security-report/

Wednesday 2/28

Why Machine Identities Are Essential Strands in Your Zero Trust Strategy (CyberArk)

While security teams don’t always apply Zero Trust principles to machine identities, for attackers, unprotected machine identities are another entry point to your organization’s sensitive data. And the problem is getting bigger.

https://www.cyberark.com/resources/blog/why-machine-identities-are-essential-strands-in-your-zero-trust-strategy

How To Detect and Stop a Ransomware Attack (Arctic Wolf)

With ransomware attacks growing at an exponential rate, and new innovations making the cyber threat landscape more dangerous than ever how can organizations stay safe? The answer lies in better threat detection and response capabilities that help you properly detect and stop a ransomware attack.

https://arcticwolf.com/resources/blog/responding-to-ransomware-time-is-of-the-essence/

Thursday 2/29

Eagle Eye ft. Bryon Singh, RailWorks Corporation

https://www.gothamtg.com/blog/eagle-eye

Today’s Attack Trends — Unit 42 Incident Response Report (Palo Alto Networks)

The report spotlights current threats as well as the impact of emerging technologies, including artificial intelligence (AI) Social Engineering, Large Language Models (LLMs), DevSec and DevSecOps, as well as the continued use of cloud-based technologies.

https://www.paloaltonetworks.com/blog/2024/02/unit-42-incident-response-report/

CloudGuard Streamlines Azure Virtual WAN security with Direct Ingress (Check Point)

As Azure Virtual WAN continues to gain popularity among enterprise customers with distributed and complex IT environments, the need for a comprehensive, consolidated, and collaborative security solution to protect these deployments becomes even more crucial.

https://blog.checkpoint.com/security/streamline-azure-virtual-wan-security-with-direct-ingress/

Friday 3/1

Five Tips to Strengthen Know Your Employee (KYE) Processes (HYPR)

The modern work environment creates situations unthinkable a decade ago. Today, many employees will never step foot in an office or have face-to-face interactions with colleagues. While this flexible work model offers advantages for businesses as well as employees, it also presents significant security challenges, especially when it comes to reliable identity verification.

https://blog.hypr.com/tips-to-strengthen-know-your-employee-kye

Cybersecurity KPIs: Metrics to Prioritize in 2024 (Axonius)

Without the right tools, collecting the right data can unfortunately lead to skewed information – like incomplete, missing, biased, or outdated data.

https://www.axonius.com/blog/cybersecurity-kpis-metrics-to-prioritize-in-2024