Monday 3/11
Why Identity Security Is Essential to Cybersecurity Strategy (CyberArk)
At the heart of cybersecurity is identity security – the principle that the right people have the right access at the right time. As we venture further into the digital world, protecting the business from modern threats is crucial, which inherently adds complexity, making smart privilege controls a must-have step toward an identity-first strategy.
https://www.cyberark.com/resources/blog/why-identity-security-is-essential-to-cybersecurity-strategy
The Future of Cybersecurity in the Age of Generative AI: Insights and Projections from a recent ESG research (Check Point)
Security professionals express cautious optimism about the potential of generative AI to bolster cybersecurity defenses, acknowledging its ability to enhance operational efficiency and threat response.
https://blog.checkpoint.com/security/the-future-of-cybersecurity-in-the-age-of-generative-ai-insights-and-projections-from-a-recent-esg-research/
Tuesday 3/12
Silicon Valley ft. Bryon Singh, RailWorks Corporation
https://www.gothamtg.com/blog/silicon-valley
To Pay or Not to Pay a Ransom? (Pure Storage)
You’ve been hit by a ransomware attack. Here’s a look at the pros and cons of paying a ransom to cybercriminals.
https://blog.purestorage.com/perspectives/youve-been-hit-by-ransomware-now-what/
Wednesday 3/13
The Top 3 Business Use Cases for Cybersecurity Asset Management (Axonius)
Cybersecurity asset management (including SaaS management and SaaS security posture management) is the foundation of cybersecurity programs and cyber risk management. Cyber risk management, however, isn’t a standalone function.
https://www.axonius.com/blog/the-top-three-business-use-cases-for-cybersecurity-asset-management
Unit 42 MDR Recognized as a Leader in MDR (Palo Alto Networks)
Palo Alto Networks has leveraged the success of its network and cloud security, EDR, and XDR tools to carve out its place as an MDR provider.
https://www.paloaltonetworks.com/blog/2024/03/unit-42-mdr-a-leader-in-mdr/
Thursday 3/14
Exploring The Distinctions: What Is The Difference Between Azure Virtual Desktop And Intune? (Nerdio)
As businesses navigate the complexities of digital transformation, understanding the nuances of these powerful solutions becomes paramount. In this comprehensive guide, we’ll explore the key differences between Microsoft Azure Virtual Desktop and Microsoft Intune, delve into their respective features and use cases, and provide actionable insights to help you determine the best fit for your organization’s unique needs.
https://getnerdio.com/resources/what-is-the-difference-between-azure-virtual-desktop-and-intune/
An Overview of the Joint Cyber Defense Collaborative Priorities (Fortinet)
More than two years ago, CISA established the Joint Cyber Defense Collaborative (JCDC) to drive a unified effort across the public and private sectors by partnering in important areas ranging from incident response to building network and national cyber resilience. Each year, CISA and its partners in government and industry pool their insights, expertise, and perspectives to identify collective priorities for the coming year.
https://www.fortinet.com/blog/ciso-collective/overview-of-joint-cyber-defense-collaborative-priorities
Friday 3/15
TA577’s Unusual Attack Chain Leads to NTLM Data Theft (Proofpoint)
Proofpoint identified notable cybercriminal threat actor TA577 using a new attack chain to demonstrate an uncommonly observed objective: stealing NT LAN Manager (NTLM) authentication information. This activity can be used for sensitive information gathering purposes and to enable follow-on activity.
https://www.proofpoint.com/us/blog/threat-insight/ta577s-unusual-attack-chain-leads-ntlm-data-theft
Password Spraying Activity Targeting Various VPN Appliances, Firewalls, and Other Public Web-Based Applications (Arctic Wolf)
Due to the dynamic nature of this campaign, blocking individual IP ranges is not likely to provide long-term protection. Arctic Wolf strongly recommends reviewing the recommendations provided here for more resilient approaches than blocking IP ranges piecemeal.
https://arcticwolf.com/resources/blog/password-spraying-activity-targeting-various-vpn-appliances-firewalls-and-other-public-web-based-applications/