This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On September 13, 2019

Monday 9/9

Ransomware Protection and Containment Strategies: Practical Guidance for Endpoint Protection, Hardening, and Containment

Ransomware is a global threat targeting organizations in all industries. The impact of a successful ransomware event can be material to an organization - including the loss of access to data, systems, and operational outages.

http://bit.ly/2lEhh6y

Malicious Android apps containing Joker malware set up shop on Google Play

In total, the applications -- made available through Google Play -- have been installed over 472,000 times by unwitting Android handset owners. The malicious applications contained a Trojan dubbed Joker, a name that references one of the domain names connected to the operator's command-and-control (C2) server.

https://zd.net/2m7JxP7

VMware Inches Closer To Carbon Black Acquisition

VMware said the purchase will allow the Palo Alto, Calif.-based virtualization superstar to provide a next-generation security cloud with Carbon Black’s protection suite and VMware’s intrinsic security assets.

http://bit.ly/2kCpt6V

Tuesday 9/10

Can’t print in Citrix from a Mac or Linux client? Here is a simple fix!

The Citrix Universal Printer and Citrix XPS Universal Printer drivers are automatically installed when you install the 7.x VDA. The HP Color LaserJet 2800 Series PS printer driver from Hewlett Packard is used by Mac and Linux clients, which require PostScript printer format.

http://bit.ly/2kDp0BA

Examine the growing role of VMware in the IoT market

IoT technology enables businesses to collect information from new endpoints and improve their operations with that data -- in some cases, quite dramatically.

http://bit.ly/2k5jEi6

Proofpoint Report: 99% of cyberattacks require human interaction to execute

More than 99 percent of threats observed required human interaction to execute- enabling a macro, opening a file, following a link, or opening a document – signifying the importance of social engineering to enable successful attacks.

http://bit.ly/2m9Sh7n

Wednesday 9/11

General Paul M. Nakasone to Deliver Opening Day Keynote at FireEye Cyber Defense Summit

General Paul M. Nakasone, United States Army, Commander, United States Cyber Command, Director, National Security Agency/Chief, Central Security Service, will deliver an opening day keynote address at the FireEye Cyber Defense Summit 2019. Astronaut and retired U.S. Navy Captain Scott Kelly will deliver this year’s closing keynote.

https://bwnews.pr/2lHqoTU

September Is Insider Threat Awareness Month: Are You Ready?

20 percent of cybersecurity incidents and 15 percent of data breaches originated with “insiders” to the organization. While they don’t happen as frequently as external attacks, insider attacks can be extremely costly and difficult to prevent and detect.

http://bit.ly/2kbSYMJ

F5 Debuts Solutions at its NGINX Conf to Reduce Sprawl and Complexity of Modern Application Delivery

Companies must modernize their apps and infrastructure in order to offer experiences as compelling as today’s most popular consumer apps—but often with far fewer means.

https://yhoo.it/2md5qfZ

Thursday 9/12

Veeam Named to the 2019 Forbes Cloud 100 for Fourth Consecutive Year

Veeam Software, has for the fourth consecutive year, been named on the Forbes 2019 Cloud 100, the definitive ranking of the top 100 private cloud companies in the world

https://yhoo.it/2lKmXMn

Ransomware attacks: Weak passwords are now your biggest risk

Brute force and remote desktop attacks have become the most common means of cyber criminals distributing ransomware, overtaking phishing emails and spam as the top technique for conducting file-encrypting malware campaigns.

https://zd.net/2k9zcRY

Friday 9/13

BlueKeep exploit is weaponized: Check Point customers remain protected

Check Point’s BlueKeep protections for network and endpoint are based on the IPS and endpoint security products released several months ago. These products are designed to protect organizations against the BlueKeep vulnerability and new weaponized versions of this attack.

http://bit.ly/2meMsFJ

FireEye to Improve Response to Privileged Access-Related Incidents With CyberArk

Together, FireEye Helix and the CyberArk Privileged Access Security Solution bring visibility of privileged events occurring throughout the organization and help minimize damage if privileged access is compromised.

http://bit.ly/2kfewrN