The Last Two Weeks in Technology

The Last Two Weeks in Technology

By Eric Corcoran
Posted in Technology Week in Review
On July 10, 2020

Monday 6/29

Pure Storage Recognized as a Leader in Enterprise Flash Array Storage and Object Storage Categories

TrustRadius has recognized both FlashArray and FlashBlade as 2020 Top Rated Award winners. With a combined average trScore of 9/10 and more than 350 verified customer reviews and ratings, FlashArray won in the Enterprise Flash Array Storage category and FlashBlade won in the Object Storage category.

Okta, CrowdStrike, Netskope, and Proofpoint Join Together to Secure Remote Work

Together, these technologies represent four best-of-breed solutions that form the core pillars of a modern, comprehensive security architecture. The companies will offer integrated solutions, advanced insights, and reference architectures, in addition to implementation best practices, accounting for end-user, device, network, and data security, demonstrating the fundamental components of a modern zero trust approach.

Tuesday 6/30

WVD Management Tools

Windows Virtual Desktop (WVD), was released in September 2019, and is seen as the next step in the evolution of Microsoft’s OS. Microsoft Azure really doesn’t offer native management of WVD, and that is where Citrix, VMware, NetApp VDS (formerly CloudJumper), and Nerdio come in.

Citrix Virtual Apps & Desktops 1912 LTSR

Citrix released Citrix Virtual Apps and Desktops 1912 LTSR last December, the first Cumulative Update was released last month with new features and fixes. This blog post details the included features and fixes.

This sneaky malware goes to unusual lengths to cover its tracks

Glupteba is a "highly self-defending malware" with the cyber-criminal group behind it paying special attention to "enhancing features that enable the malware to evade detection". Its method of distribution is relatively simple: it's bundled in pirated software, including cracked versions of commercial applications, as well as illegal video game downloads.

Wednesday 7/1

Simplifying SD-WAN with Centralized Management and Orchestration (Fortinet)

Blending enterprise-class security and branch networking capabilities into a single, centralized management and orchestration system provides critical benefits, the most important of which is decreasing cyber risk. But by consolidating the number of networking and security tools required, it can also significantly lower total cost of ownership.

Nvidia expands virtual GPU support, enabling more remote work

Nvidia is also adding new features in vGPU for enterprise IT admins and cloud service providers, such as cross-branch support, where the host and guest vGPU software can be on different versions. This should make it easier to perform upgrades and large deployments.

Thursday 7/2

5 Reasons to Re-Evaluate your Cloud Email Security (Check Point)

Are you aware of the new security risks that these new environments pose? We’ve listed 5 reasons you should re-evaluate your cloud email security

Top 5 Features of v11.5: Flexibility for the New Normal (CyberArk)

As organizations learn to practice risk distancing, many are now accelerating their digital transformation initiatives by introducing new applications, devices and critical IT assets. Unfortunately, these changes also introduce new risks – many of which organizations are simply not prepared for.

Tuesday 7/7

Citrix provides context on Security Bulletin CTX276688

Today Citrix published a security bulletin covering a set of vulnerabilities in our networking products — Citrix ADC, Citrix Gateway, and Citrix SD-WAN WANOP edition. The latest patches fully resolve all the issues.

F5 patches vulnerability that received a CVSS 10 severity score

F5 Networks has published a security advisory this week warning customers to patch a dangerous security flaw that is very likely to be exploited. The vulnerability impacts the company's BIG-IP product.

Wednesday 7/8

Building Trust in Your Business Email Communication (Proofpoint)

Deploying Domain-based Message Authentication Reporting and Conformance (DMARC) is a great start to ensure the emails you receive are trustworthy. DMARC allows users to reveal what an email from your organization looks like, allowing them to authenticate any message that looks like it's from you and automate taking appropriate action.

Security training needs to become a WFH priority (Barracuda)

Cybersecurity teams might want to consider signing up more end users for online training. Phishing simulation training platforms delivered as a cloud service, for example, can be easily be accessed remotely by end users.

Microsoft takes legal action against COVID-19-related cybercrime

These cybercriminals designed the phishing emails to look like they originated from an employer or other trusted source and frequently targeted business leaders across a variety of industries, attempting to compromise accounts, steal information and redirect wire transfers.

Thursday 7/9

IGEL First to Deliver Microsoft Teams Optimization with Citrix Workspace App Linux Client

Ideal for remote and distributed workforces, the combined solution of IGEL OS, Microsoft Teams and Citrix Workspace App empowers users with immersive, high-fidelity calling, online meetings, chat and collaboration directly from their Citrix virtual desktop infrastructure (VDI) workspace.

Cyber Attacks in the Pandemic Era: More of the Same (CyberArk)

But while some threat actors ramped up efforts to maximize profits amidst the crisis – nothing has substantially changed in their approach.

Best Practices for Adapting to a Remote Work Lifestyle (McAfee)

Navigating change can be difficult for many, so here are useful tips McAfee team members have been using to improve productivity, stay healthy?and help customers stay digitally secure during the pandemic.

Friday 7/10

Fighting COVID-19 in New Era of Scientific Computing (NVIDIA)

NVIDIA’s also making all our new and improved GPU-optimized scientific computing applications available through NGC for researchers to accelerate their time to insight

Why Digital Transformation Success Requires Multicloud (Pure Storage)

The current situation has proven that procrastinating about digital transformation was not just shortsighted—it was a mistake. This has put multicloud capabilities front and center as the current landscape evolves. However, for multicloud to succeed, you’ll need the modern infrastructures to support it.