This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On January 10, 2025

Thursday 1/2

How SASE Addresses Enterprise Network Challenges (Check Point)

Organizations implementing SASE have reported improved operational efficiency, with streamlined management and reduced complexity leading to better resource allocation and faster response times to security incidents.

https://blog.checkpoint.com/harmony-sase/how-sase-addresses-enterprise-network-challenges/

Citrix Secure Private Access delivers ZTNA in hybrid mode (Citrix)

Implementing ZTNA organization-wide is not a trivial undertaking. Because coordination across networking and security teams can be complex and time-consuming, we designed Citrix Secure Private Access to reduce the cognitive burden on IT by making it far simpler to implement than most ZTNA solutions.

https://www.citrix.com/blogs/2024/12/13/citrix-secure-private-access-for-hybrid-deployments/

Friday 1/3

Microsoft’s SFI: A Blueprint for Identity Security (HYPR)

Microsoft has dedicated a substantial chunk of its engineering workforce to the effort ”to address the increasing scale, speed, and sophistication of cyberattacks.” In line with this mandate, a key area of focus is the protection of identities and secrets.

https://blog.hypr.com/microsoft-sfi-a-blueprint-for-identity-security

Shift Your Cybersecurity Mindset for 2025: A Year-Round Approach to SOC Success (Adlumin)

The reality is that cyberattacks don’t adhere to holiday schedules, they occur daily, regardless of the season. To stay ahead of these constant threats, SOC teams must adopt proactive strategies, not just to navigate holiday-specific risks but to build a foundation for sustained success well into 2025 and beyond.

https://adlumin.com/post/shift-your-cybersecurity-mindset-for-2025-a-year-round-approach-to-soc-success/

Monday 1/6

Remediating an Uninstall Issue During a Citrix StoreFront Upgrade

https://www.gothamtg.com/blog/uninstall-issue-during-citrix-storefront-upgrade

The many ways to obtain credentials in AWS (Wiz)

Dive into the complexities of AWS IAM credentials and uncover how defenders can stay ahead with in-depth knowledge of SDK behaviors and service-specific mechanisms.

https://www.wiz.io/blog/the-many-ways-to-obtain-credentials-in-aws

The Crucial Role of Data Forensics in Post-cyberattack Recovery (Pure Storage)

Once you’re back up and running after a cyberattack, the next step will be trying to figure out what happened. Learn what data forensics is and why it’s important.

https://blog.purestorage.com/perspectives/the-crucial-role-of-data-forensics-in-post-cyberattack-recovery/

Tuesday 1/7

CIS Safeguard 1.4: Use DHCP Logging to Update Enterprise Asset Inventory

https://www.gothamtg.com/blog/cis-safeguard-14-use-dhcp-logging-to-update-enterprise-asset-inventory

Why MFA is Good, but Not Good Enough: The Need for Defense-in-Depth to Combat MFA Bypass (Proofpoint)

The battle against MFA bypass tactics is a good example of the dynamic nature of today’s cyber threats. When you adopt a defense-in-depth strategy, you ensure that even if one layer of your security fails there are other layers than can absorb the impact.

https://www.proofpoint.com/us/blog/identity-threat-defense/why-mfa-good-not-good-enough-need-defense-depth-combat-mfa-bypass

Wednesday 1/8

December 2024 Uptick in Social Engineering Campaign Deploying Black Basta Ransomware (Arctic Wolf)

In most instances, threat actors were observed sending a flood of email spam to victim mailboxes with emails from subscription services. They would then proceed to call victims in a voice phishing (vishing) attack posing as IT support, under the pretext of offering assistance in resolving the email flood issue. 

https://arcticwolf.com/resources/blog/december-2024-uptick-in-social-engineering-campaign-deploying-black-basta-ransomware/

Cloud Security Audits Explained: Challenges and Solutions (CyberArk)

Like all security audits, cloud security audits help ensure that data is kept safe from unauthorized access and theft. They are a comprehensive evaluation of an organization’s cloud infrastructure, policies and procedures to assess their effectiveness in safeguarding sensitive data and ensuring compliance with regulatory standards.

https://www.cyberark.com/resources/blog/cloud-security-audits-explained-challenges-and-solutions

Thursday 1/9

Unify Security Posture and Protection for Faster Cloud Detection and Response (CrowdStrike)

As cloud environments and the attacks targeting them grow more complex, we discuss the importance of deep visibility, cloud context and shaping threat response to strengthen cloud security posture.

https://www.crowdstrike.com/en-us/blog/unify-security-posture-protection-for-faster-cdr/

Cloud Native Security: Balancing Consolidation and Flexibility (Bitdefender)

As organizations of all sizes continue to adopt cloud technologies, the importance of Cloud Native Security (CNS) has grown. CNS is designed to protect applications running in cloud environments, addressing the unique challenges they present. With options beyond standalone point solutions now available, it’s essential to weigh the benefits and potential drawbacks, particularly when considering consolidation strategies. 

https://www.bitdefender.com/en-us/blog/businessinsights/cloud-native-security-balancing-consolidation-and-flexibility

Friday 1/10

Using Identity Security Posture Management to measure and demonstrate risk reduction (Delinea)

With Identity Security Posture Management, you can get a much more targeted understanding of your identity security posture. You can measure what your current risk exposure is so that your leadership can make an informed decision as to whether they’re willing to accept that risk. If it’s out of alignment, ISPM helps you close that gap.

https://delinea.com/blog/using-ispm-to-measure-and-demonstrate-risk-reduction

Experience the difference: New optimization for Microsoft Teams in Citrix environments (Citrix)

This isn’t just an improvement; it’s a paradigm shift in Microsoft Teams experience on Citrix. The new optimization architecture allows to achieve feature parity between native and Citrix environments, ensuring a seamless experience for users.

https://www.citrix.com/blogs/2024/12/16/experience-the-difference-new-optimization-for-microsoft-teams-in-citrix-environments/