This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On March 22, 2024

Monday 3/18

Gotham has earned a spot on the 2024 #CRNTechElite250 list, recognizing us as one of the top IT solution providers in North America. We are proud to continue to provide the best service for our customers. @thechannelco

Click the link to see the full list. www.CRN.com/TechElite250

Let AI Handle the Heavy Lifting in the Modern SOC (Palo Alto Networks)

AI is transforming the SOC landscape by automating mundane tasks like alert triage, allowing even smaller SOC teams to handle large workflows (not possible in the past) with limited manual and siloed tools.

https://www.paloaltonetworks.com/blog/2024/03/ai-in-the-modern-soc/

How To Better Secure Active Directory (Arctic Wolf)

While Active Directory can be essential in helping organizations manage their users and access within their network, it’s also quickly becoming a must-hack for threat actors looking to execute sophisticated cyber attacks. Organizations must see AD not as secure-by-default, but as a part of their identity infrastructure that needs consistent hardening and robust security.

https://arcticwolf.com/resources/blog/how-to-better-secure-active-directory/

Tuesday 3/19

Person of Interest ft. Bryon Singh, RailWorks Corporation

https://www.gothamtg.com/blog/person-of-interest

February 2024’s Most Wanted Malware: WordPress Websites Targeted by Fresh FakeUpdates Campaign (Check Point)

Researchers uncovered a new campaign with FakeUpdates, also known as SocGolish, targeting and compromising WordPress websites with hacked admin accounts. Meanwhile, Play entered the top three of most wanted ransomware groups and education remained the most attacked sector worldwide.

https://blog.checkpoint.com/research/february-2024s-most-wanted-malware-wordpress-websites-targeted-by-fresh-fakeupdates-campaign/

5 Best Practices to Secure Azure Resources (CrowdStrike)

As organizations choose cloud service providers to power their technological transformations, they must also properly secure their cloud environments to protect sensitive data, maintain privacy and comply with stringent regulatory requirements.

https://www.crowdstrike.com/blog/azure-security-best-practices/

Wednesday 3/20

How to Align Your Security Strategy with NIST Cybersecurity Framework 2.0 (CyberArk)

NIST CSF 2.0, released on Feb 26, 2024, expands the scope and applicability of the framework to cover more types of organizations and industries, including the private sector, government and nonprofits.

https://www.cyberark.com/resources/blog/how-to-align-your-security-strategy-with-nist-cybersecurity-framework-2-0

Just-in-Time Cloud Storage for Nutanix Cloud Clusters (Nutanix)

This newly-added AWS second-tier storage to NC2 future-proofs customers and improves existing use cases like elastic disaster recovery and lift-and-shift workload portability.

https://www.nutanix.com/blog/just-in-time-cloud-storage-for-nutanix-cloud-clusters

Thursday 3/21

10 Ways the Pure Storage Data Platform Uncomplicates Data Storage, Forever (Pure Storage)

Balancing innovation with the need to constantly update infrastructures to support it is one of the biggest enterprise IT headaches, but it doesn’t have to be. Here are 10 ways Pure Storage can uncomplicate your data storage, forever.

https://blog.purestorage.com/perspectives/10-ways-the-pure-storage-data-platform-uncomplicates-data-storage-forever/

Break Free from Appliance-Based Secure Web Gateway (SWG) (Zscaler)

With employees and apps both migrating off-premises, security controls logically must do the same. It’s no exaggeration to state that cloud and mobility have broken the legacy way of approaching security—so why should the castle-and-moat security approach, heavily reliant on hardware such as appliance-based proxies/SWGs, still exist?

https://www.zscaler.com/blogs/product-insights/break-free-appliance-based-secure-web-gateway-swg

Friday 3/22

Aligning With NSA’s Cloud Security Guidance: Four Takeaways (HYPR)

The agency emphasizes that these measures are critical for every company that uses cloud services as these environments are increasingly targeted by malicious cyber actors (MCAs).

https://blog.hypr.com/nsa-cloud-security-guidance

Reduce MTTR with latest features from Citrix Director (Citrix)

In the fast-paced world of IT support, minimizing Mean Time to Resolution (MTTR) is crucial for maintaining productivity and ensuring a seamless user experience. Citrix Director has introduced a range of new features designed to streamline troubleshooting processes and expedite issue resolution. Let’s explore how these enhancements contribute to reducing MTTR.

https://www.citrix.com/blogs/2024/03/20/reduce-mttr-with-latest-features-from-citrix-director/