This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On May 24, 2024

Monday 5/13

CrowdStrike Enhances Cloud Asset Visualization to Accelerate Risk Prioritization (CrowdStrike)

The massive increase in cloud adoption has driven adversaries to focus their efforts on cloud environments — a shift that led to cloud intrusions increasing by 75% in 2023, emphasizing the need for stronger cloud security.

https://www.crowdstrike.com/blog/enhanced-cloud-asset-visualization/

CISA opens its malware analysis and threat hunting tool for public use (CSO Online)

https://www.csoonline.com/article/2089512/cisa-opens-its-malware-analysis-and-threat-hunting-tool-for-public-use.html

Tuesday 5/14

38 Gotham employees signed up for our month-long virtual fitness challenge, raising money for NPower, a national nonprofit organization that provides free tech training for careers in Information Technology to military veterans and young adults from under-served communities.

Click the link below to learn more about NPower.

https://www.npower.org/

Untangling IT-OT Security Knots with a Zero Trust Platform Approach (Palo Alto Networks)

To fortify governance and operational models, organizations can embrace a unified approach, leveraging the same platform for IT and OT security. This streamlining reduces complexity and ensures a cohesive strategy that effectively protects against threats by promoting a secure, consistent and collaborative environment between IT and OT teams.

https://www.paloaltonetworks.com/blog/2024/05/untangling-it-ot-security-knots/

HYPR and Microsoft Partner on Entra ID External Authentication Methods (HYPR)

Organizations can now choose HYPR phishing-resistant authentication for their Entra ID MFA method, use it in Entra ID Conditional Access policies, Privileged Identity Management, and more.

https://blog.hypr.com/hypr-entra-id-external-authentication-methods

Wednesday 5/15

The Anatomy of Cloud Identity Security (CyberArk)

As threat actors continue to refine log-in attack methods during the escalating adoption of cloud technology, it becomes increasingly clear that relying solely on legacy security measures is no longer sufficient. Embracing a cloud-first mentality and prioritizing identity security in the cloud is the next step in fortifying defenses in this perimeter-less era.

https://www.cyberark.com/resources/blog/the-anatomy-of-cloud-identity-security

How to Maintain Your Cyber Security Hygiene for a Vulnerability-free Environment (Check Point)

No matter how basic or complex, these fundamentals of cyber security hygiene equip you with the knowledge to maintain a healthy and secure digital space.

https://blog.checkpoint.com/securing-the-cloud/how-to-maintain-your-cyber-security-hygiene-for-a-vulnerability-free-environment/

Tuesday 5/21

The Dark Side of AI in Cybersecurity — AI-Generated Malware (Palo Alto Networks)

As artificial intelligence (AI) continues to evolve at an unprecedented pace, its impact on the cybersecurity landscape is becoming increasingly apparent. While AI has the potential to revolutionize threat detection and defense strategies, it can also be exploited by malicious actors to create more sophisticated and evasive threats.

https://www.paloaltonetworks.com/blog/2024/05/ai-generated-malware/

Transforming Critical Infrastructure Security: The Power of Identity (CyberArk)

The future of strong cybersecurity strategies is intrinsically linked to the identity of each user and machine across your network. This insight is crucial at a time when critical infrastructure sectors such as energy, healthcare and finance face unprecedented risks.

https://www.cyberark.com/resources/blog/transforming-critical-infrastructure-security-the-power-of-identity

Wednesday 5/22

How To Right-Size Shared Host Pools (Nerdio)

Finding the right number and size of Azure virtual machines for a shared host pool is critical to a successful Microsoft Azure Virtual Desktop (AVD) deployment. Host pool right-sizing can heavily impact your end-user experience, so it’s imperative to set them up correctly from the jump.

https://getnerdio.com/resources/how-to-right-size-shared-host-pools/

New CrowdStrike Capabilities Simplify Hybrid Cloud Security (CrowdStrike)

CrowdStrike announced certifications, integrations and platform enhancements for Linux and Kubernetes administrators at Red Hat Summit.

https://www.crowdstrike.com/blog/new-crowdstrike-capabilities-simplify-hybrid-cloud-security/

Thursday 5/23

5 data security concepts you need to know (Check Point)

Last year it was reported that almost half of companies have at least one database or storage asset exposed to the public internet. While this isn’t necessarily a bad thing, when you add in the prevalence of misconfigurations, vulnerabilities, and the like…the potential for a breach begins to grow rapidly.

https://blog.checkpoint.com/securing-the-cloud/5-data-security-concepts-you-need-to-know/

How CISOs Can Reduce Third-party Attack Vectors (Pure Storage)

Third-party software providers are the latest attack vector cybercriminals are targeting to breach even bigger targets. Here are eight ways organizations can reduce their risk.

https://blog.purestorage.com/perspectives/how-cisos-can-reduce-third-party-attack-vectors/

Friday 5/24

Shifting from CWPP to CNAPP: new standards for cloud security (Wiz)

Learn where CNAPP and CWPP overlap, where they differ, and how the market is shifting to the more comprehensive and integrated CNAPP.

https://www.wiz.io/blog/cwpp-vs-cnapp

Nutanix Widens Coverage for Cloud Native Users With Expanded Project Beacon (Nutanix)

Cloud Native AOS will deliver automated replication of all container data across availability zones and regions allowing a container to seamlessly access its data wherever it is running. With this capability, even the simplest application will benefit from the most advanced levels of resilience and high availability.

https://www.nutanix.com/blog/nutanix-widens-coverage-for-cloud-native-users-with-expanded-project-beacon