This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On May 10, 2024

Monday 5/6

Prisma SASE 3.0 — Securing Work Where It Happens (Palo Alto Networks)

This unrestricted approach empowers users, but it also increases risk due to a lack of consistent security, control and visibility across devices. Security strategies must catch up, and Palo Alto Networks is once again leading that charge.

Understanding Risk-Based Vulnerability Management (Arctic Wolf)

For all the concern about phishing, insider threats, and other sophisticated tactics, when it comes to unlocking those first doors during a cyber attack, it’s vulnerabilities that threat actors continually turn to, and there’s plenty to choose from.

Tuesday 5/7

CrowdStrike Cloud Security Defines the Future of an Evolving Market (CrowdStrike)

CrowdStrike announces the general availability of Falcon Application Security Posture Management and the expansion of our cloud detection and response leadership, representing the future of cloud security and our vital role in the market.

A New Power-up for Data Resilience: A Guide to Object-level Exclusions (Pure Storage)

Learn how object-level exclusions in Pure1 can help to improve Data Protection Assessment insights by filtering out non-essential data that could skew results.

Wednesday 5/8

GenAI Is Powering the Latest Surge in Modern Email Threats (Proofpoint)

Generative artificial intelligence (GenAI) tools like ChatGPT have extensive business value. They can write content, clean up context, mimic writing styles and tone, and more. But what if bad actors abuse these capabilities to create highly convincing, targeted and automated phishing messages at scale?

What does "Platform" mean in cloud security? (Wiz)

Platformization has become a hot topic in enterprise tech, particularly when it comes to cybersecurity and cloud. Organizations are fed up with managing a hodgepodge of point solutions. They want better visibility, no siloes, less noise, more context.

Thursday 5/9

Citrix platform offers robust protection against APTs (Citrix)

Advanced Persistent Threats (APTs) represent sophisticated, stealthy attacks that can infiltrate and compromise enterprise infrastructures over extended periods. Research suggests that by 2028, the market for advanced persistent threat protection is projected to surpass $23 billion, up from an anticipated $10 billion in 2024.

The Importance of Identity Security in Zero Trust Endpoint Defense (CyberArk)

If your endpoint security strategy is built around capabilities that scrutinize applications, processes and actions and respond to those deemed malicious, your Zero Trust initiative should get some attention in the endpoint department. After all, isn’t Zero Trust fundamentally about proactive rather than reactive measures?

Friday 5/10

April 2024’s Most Wanted Malware: Surge in Androxgh0st Attacks and the Decline of LockBit3 (Check Point)

Researchers recently identified a spike in Androxgh0st attacks, a Trojan that targets Windows, Mac and Linux platforms, which saw it jump straight into second place in the top malware list. Meanwhile, LockBit3 narrowly remains the top ransomware group, despite a reduction in its prevalence.

Announcing General Availability of Nutanix Central (Nutanix)

Nutanix Central provides customers with unified infrastructure management and unparalleled control and visibility on-premises and in public clouds via the Nutanix Cloud Clusters (NC2) solution on the AWS and Azure public clouds.