This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On March 08, 2024

Monday 3/4

You Don’t Have to Compromise: All-flash Storage Reduces Costs for All Workloads (Pure Storage)

Organizations face the challenge of IT cost optimization: balancing burgeoning data demands with constrained budgets. Pure Storage offers an innovative, proven solution that ensures companies can meet their storage needs without compromise.

https://blog.purestorage.com/perspectives/you-dont-have-to-compromise-all-flash-storage-reduces-costs-for-all-workloads/

Why EDR is Not Enough (Arctic Wolf)

Endpoints are critical to the success of cyber attacks. While the definition what an endpoint is, exactly, has shifted over time, the threat has remained the same: Threat actors need a device to spread malware, encrypt assets, and harvest application credentials — they need an endpoint.

https://arcticwolf.com/resources/blog/endpoint-detection-and-response-is-not-enough/

Tuesday 3/5

Gotham's CTO Ken Phelan was featured on Channel Insider's Partner POV with Katie Bavoso to discuss how our expertise coupled with vendor solutions help us secure and support our customers in the NYC metro area. Click the link below for the full interview.

https://www.youtube.com/watch?v=x6cp7O5Md9k

Navigating the Evolution of Cybersecurity: The Leap from NIST 1 to NIST 2 (Check Point)

As a leader in strategic consulting and provider of comprehensive NIST cyber risk assessments, we’re excited to announce the upcoming release of our modified services, meticulously aligned with the new NIST Framework Version 2. This evolution marks a significant milestone in our commitment to offering state-of-the-art cybersecurity solutions that not only meet but exceed the industry standards.

https://blog.checkpoint.com/security/navigating-the-evolution-of-cybersecurity-the-leap-from-nist-1-to-nist-2/

How Time, Entitlements and Approvals (TEA) Can Secure the Keys to Your Cloud (CyberArk)

A popular topic of conversation in my day-to-day work is how to secure privileged access to cloud management consoles and workloads. And that’s no surprise, considering more and more applications and workloads are migrating to the cloud.

https://www.cyberark.com/resources/blog/how-time-entitlements-and-approvals-tea-can-secure-the-keys-to-your-cloud

Wednesday 3/6

Citrix product vision and strategy in 2024 and beyond (Citrix)

Looking ahead, we will continue to reinvest in our strengths: our industry-leading flexibility, end-user experience, and Zero Trust security. The Citrix platform is poised to deliver you the best enterprise software that will meet all your application delivery infrastructure needs now and in the future.

https://www.citrix.com/blogs/2024/03/05/citrix-product-vision-and-strategy-in-2024-and-beyond/

CrowdStrike to Acquire Flow Security, Sets the Standard for Modern Cloud Data Security (CrowdStrike)

With this acquisition, CrowdStrike will redefine modern data security with a unified platform that protects data at rest and in motion as it flows through the cloud, on-premises and within applications

https://www.crowdstrike.com/blog/crowdstrike-to-acquire-flow-security-redefines-modern-cloud-data-security/

Thursday 3/7

Today’s Attack Trends — Unit 42 Incident Response Report (Palo Alto Networks)

The report spotlights current threats as well as the impact of emerging technologies, including artificial intelligence (AI) Social Engineering, Large Language Models (LLMs), DevSec and DevSecOps, as well as the continued use of cloud-based technologies.

https://www.paloaltonetworks.com/blog/2024/02/unit-42-incident-response-report/

Using Deterministic Security Controls To Stop Generative AI Attacks (HYPR)

Deepfake cyberattacks, phishing, and social engineering have all received a turbo boost in recent months due to the proliferation of easily accessed AI tools. Cybercriminals are some of the most creative individuals in the world. They spend their days conjuring up different ways to bypass security systems, not filling out spreadsheets and reports.

https://blog.hypr.com/preventing-generative-ai-attacks

Friday 3/8

Decoding Azure Virtual Desktop: What Is AVD, And How Does Nerdio Maximize Its Efficiency? (Nerdio)

As remote work continues to permeate modern workplaces, the demand for virtual desktop solutions like Microsoft’s Azure Virtual Desktop (AVD) has seen a significant surge. With the ever-evolving nature of work, businesses are increasingly recognizing the imperative of furnishing secure and adaptable access to systems and applications from any location and device.

https://getnerdio.com/resources/what-is-azure-virtual-desktop/

Cybersecurity Stop of the Month: Detecting a Multilayered Malicious QR Code Attack (Proofpoint)

Typically, in a QR code attack a malicious QR code is directly embedded in an email. But recently, attackers have come up with a new and sophisticated variation. In these multilayered attacks, the malicious QR code is hidden in what seems like a harmless PDF attachment.

https://www.proofpoint.com/us/blog/email-and-cloud-threats/malicious-qr-code-attack