This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On March 29, 2024

Monday 3/25

Is your VPN reaching End of Maintenance? Don’t let it put you at risk (Check Point)

A legacy VPN does one thing and one thing only: it connects remote workers to the company network. The problem is that most employees don’t need, and shouldn’t have, access to the entire network, just to specific applications and data within it.

Tuesday 3/26

Barbasol ft. Bryon Singh, RailWorks Corporation

How to Defend Employees and Data as Social Engineering Evolves (CrowdStrike)

As social engineering continues to evolve and pose a significant threat, it’s essential for security teams of all maturity levels to prepare to defend against these methods.

Zero Trust: The Key to a Hybrid Workforce (Palo Alto Networks)

Cybercrime presents real and present danger to individuals and businesses alike. In fact, total losses resulting from internet cybercrime grew approximately 50% from 2021 to 2022 — jumping from $6.9 to $10.3 billion — while the total U.S. reported crime complaints decreased 5%, according to the 2022 FBI Internet Crime Report.

Wednesday 3/27

Navigating the Transition to New Microsoft Teams on VDI: What You Need to Know

How To Achieve Vulnerability Remediation (Arctic Wolf)

There were over 29,000 vulnerabilities published in 2023, amounting to over 3,800 more common vulnerabilities and exposure (CVEs) identifiers being issued last year than in 2022. But that doesn’t mean these most recent vulnerabilities are the only ones in a threat actor’s toolbox.

Why is the Exposure Management Market So Confusing? Wading Through the Acronyms (Bitsight)

The fundamental driving force behind exposure management doesn't need to be so confusing once we wade through the acronyms and get to the heart of things. Exposure management is bubbling up to serve the security team's need for better visibility into the state of assets that goes beyond the rudimentary CVEs of traditional vulnerability management.

Thursday 3/28

Dangling DNS: Spring Cleaning to Protect Against Impersonation Risk (Proofpoint)

It is well-established that email is the number one threat vector for cyberattacks. It’s a go-to for many bad actors because they don’t need to be highly skilled to initiate an email-based attack. Nor do they need to do elaborate work upfront. Their success hinges on their ability to be convincing.

Friday 3/29

Witnessing a Revolution in Cybersecurity with AI (Palo Alto Networks)

With AI, organizations can implement a proactive approach and stay ahead of cyber adversaries with systems that can analyze vast amounts of data in real time, identify patterns, predict potential threats, as well as detect and neutralize malicious activity before they can cause significant damage.

2024 Enterprise Cloud Index: Top Priorities and Challenges for IT Leaders (Nutanix)

Based on the survey results, it’s clear that a unified hybrid multicloud architecture that provides a common operating model across cloud, on-premises, and edge environments, is critical to success.