This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On December 13, 2019

Monday 12/2

Build an Enterprise-grade Hybrid Cloud with Pure on AWS

Pure and AWS got together to help provide enterprises with a consistent data layer across their on-premises and cloud environments. This consistent data layer with consistent data services and APIs is now possible with Pure Storage Cloud Data Services.

SOC Efficiency Improving Thanks to SOAR

SOAR solutions help security analysts with the complete visibility of the cyber campaign delivered as a unified dashboard. Responding from a single screen and centralizing multiple tools into one screen reduces your team’s learning curve.

Tuesday 12/3

Long-known Vulnerabilities in High-Profile Android Applications

The following tables summarize our results, as of June 2019, for three vulnerabilities of critical severity (Arbitrary Code Execution) from 2014, 2015 and 2016. The list includes hundreds of popular Android apps, including Yahoo Browser, Facebook, Instagram and WeChat.

Need Backup for Cloud Databases, Cloud VMs, and Files? We’ve got you covered!

As cloud becomes more popular, further reducing storage costs when backing up or archiving to the cloud is becoming a high priority. Here’s how Cohesity is addressing these challenges.

Wednesday 12/4

Secure Cloud Architecture: Avoiding Technical Debt

F5 takes advantage of creating patterns—patterns that every app in any environment can utilize, regardless of where that app lives or which vendors are used.

FireEye Expands Cloud Security Capabilities on Amazon Web Services

FireEye Detection On Demand is a scalable security layer that makes it easy for organizations to analyze untrusted content. Using insights gained from FireEye Threat Intelligence experts, the cloud-native service is designed to provide detailed information as to why content has been flagged as malicious.

Authorities take down 'Imminent Monitor' RAT malware operation

Law enforcement agencies from all over the world announced today they took down the infrastructure of the Imminent Monitor remote access trojan (IM-RAT), a hacking tool that has been on sale online for the past six years.

Thursday 12/5

CyberArk Achieves AWS Security Competency Status

This designation recognizes the CyberArk Privileged Access Security Solution for demonstrated proven technology and deep expertise to enable customers to reduce security risk across their cloud initiatives.

Upgrade your ADC from 10.5 to 11.x/12.x – Lessons from the field

Citrix ADC 10.5 has themes, features, and capabilities that differentiate it from newer versions, so upgrading requires some care when transitioning.

Monday 12/9

Chris Carter from FireEye Honored as Security Channel Chief of the Year

Under his leadership, Carter’s team executes partnering strategies with leading security Value Added Resellers and Integrators, while working with distribution partners to increase market reach.

Buer, a new loader emerges in the underground marketplace

Since late August 2019, Proofpoint researchers have been tracking the development and sale of a new modular loader named Buer by its authors. Buer has features that are highly competitive with Smoke Loader, is being actively sold in prominent underground marketplaces, and is intended for use actors seeking a turn-key, off-the-shelf solution.

Tuesday 12/10

The security of Citrix Web App Firewall – now on the AWS Marketplace

Citrix Web App Firewall is an enterprise-grade WAF solution that mitigates threats against customers’ public-facing and internal web assets, including websites, applications, and APIs.

Nutanix Once Again (and Again) Named a Leader in Gartner Magic Quadrant for Hyperconverged Infrastructure

“Our goal is to make IT and cloud infrastructure so simple that it fuels innovation and business growth. Nutanix provides flexibility, not only via our products and solutions, but also from the freedom to choose the best HCI consumption model for the business,” said Dheeraj Pandey, Chairman, Founder and CEO at Nutanix.

Wednesday 12/11

IGEL Expands Endpoint Security Capabilities to Enable a Complete “Chain of Trust”

The latest version of IGEL OS Workspace Edition offers advanced security features including signed OS partitions for expanded system-wide authentication.

SIEM vs. MSSP vs. MDR: An Essential Guide

Of the three security models, which one is the most viable for your organization? How do you choose the option that best meets your business needs? Here’s our take on the pros and cons of the three security models and how to identify the right solution for your organization.

Thursday 12/12

Amazon VPC Ingress Routing – Reducing Deployment Complexity for Network Security Customers

With Amazon VPC Ingress Routing, customers can define routing rules at the Internet Gateway (IGW) and Virtual Private Gateway (VGW) to redirect ingress traffic to third-party appliances, before it reaches the final destination.

Accelerate Security Operations Leveraging Fortinet’s Security Fabric + SOAR

Before digital transformation, securing networks was pretty straightforward. However, competing successfully in today’s digital marketplace requires one of the most rapid and comprehensive transformations of business networks in history, and security must keep up.

Friday 12/13

Unleash a better way to work with Citrix Workspace

Citrix Workspace can streamline the workday for employees by organizing, guiding, and automating work in an intelligent and personal way, transforming the employee experience.

The CISO Perspective on IT Asset Management: Why Security and ITAM Go Hand-In-Hand

In a recent CISO panel hosted by Ivanti, experts agreed that IT asset management (ITAM) is a piece of the security puzzle that must be solved.