This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On November 13, 2020

Monday 11/2

Citrix Expands Digital Workspace Security Offerings

The Citrix Ready Workspace Security Program provides a choice of leading security vendors that complement Citrix solutions, allowing people to securely work anytime, from anywhere, while simplifying how IT manages the environment.

https://bwnews.pr/382Ydox

McAfee debuts remote browser isolation solution, XDR platform

McAfee has launched a selection of new cybersecurity offerings including remote browser isolation tools to tackle attacks in real-time.

https://zd.net/325x0ho

Wednesday 11/4

FireEye releases ThreatPursuit, a Windows VM for threat intel analysts

The idea behind ThreatPursuit is to provide companies with a ready-made OS that can be deployed to new workstations before, during, or after a security incident and provide threat intel analysts with a ready-to-use work environment.

https://zd.net/3eBWKHf

Rethink the Cloud and Redefine Your Storage Strategy (Pure Storage)

With remote work quickly becoming a norm to support business continuity, consider the importance of remote manageability and accessibility of mission-critical workloads when redefining your storage strategy.

https://bit.ly/328zUSk

Proofpoint Named a Leader in 2020 Gartner Magic Quadrant for Enterprise Information Archiving for Ninth Consecutive Year

Proofpoint announced it has been positioned by Gartner, Inc. in the Leaders quadrant of the 2020 Magic Quadrant for Enterprise Information Archiving* for the ninth consecutive year.

https://bit.ly/3exGRl2

Thursday 11/5

Moving Beyond Traditional EDR (Palo Alto Networks)

XDR extends all the benefits you expect from a traditional EDR product by further stitching together telemetry from non-endpoint sources to provide better detection and a bigger picture of what’s going on in your environment for your security operations team.

https://bit.ly/3k005Re

Four Reasons to Strengthen Identity Security with SSO (CyberArk)

While it’s widely accepted that the “perimeter is dead,” current realities are forcing many organizations to evolve their security approaches faster than planned.

https://bit.ly/3oZxm2O

Monday 11/9

CyberWins: Arctic Wolf Saves the Day in the Middle of the Night for Large Manufacturer

Seven minutes after Arctic Wolf called the customer, the machine was off the network before the compromise was able to spread and inflict further damage.

https://bit.ly/2IcTiae

Join Netskope from 12/7-12/10 for SASE Week, a weeklong series of virtual events catered to helping you understand Secure Access Service Edge architecture and enabling your digital transformation journey. See the link below for more details.

https://bit.ly/3eF9NHC

Tuesday 11/10

Check Point Software Launches Industry’s First Cyber Security Platform with Autonomous Threat Prevention

New R81 platform eliminates and automates labor-intensive security administration and management, also reducing policy installation time by up to 90%* across the entire distributed enterprise.

https://bit.ly/3petLOr

CyberArk Launches AI-Powered Service to Remove Excessive Cloud Permissions

As organizations rapidly scale cloud deployments, access permissions are often granted by default, based on group or role, and can go unused or have more entitlements than they actually need.

https://bit.ly/3pfT1E0

This new malware wants to add your Linux servers and IoT devices to its botnet

A new form of malware is targeting Linux servers and Internet of Things (IoT) devices and adding them to a botnet in what appears to be the first stage of a hacking campaign targeting cloud-computing infrastructure.

https://zd.net/3p9zTaN

Wednesday 11/11

Proactive protection with Citrix Analytics for Security

Citrix Analytics for Security is a cloud-delivered security platform that helps protect corporate assets and minimize risk. It continually assesses user behavior in the digital workspace.

https://bit.ly/3pjkuEL

Palo Alto Networks Announces Intent to Acquire Expanse

Expanse's internet collection and attribution platform constantly monitors the global internet to map exposed and untracked assets that comprise customers' attack surfaces, evaluate and prioritize risk, and provide mitigation.

https://prn.to/3phNXyU

Thursday 11/12

Mobile Phishing Increases More Than 300% as 2020 Chaos Continues (Proofpoint)

This recent surge in mobile phishing reports is concerning given that our recent Proofpoint 2020 State of the Phish Report found that 84% of organizations were subject to mobile-based phishing attacks, and the FBI has reported that losses from phishing and other scams topped more than $3.5 billion to individual and business victims in 2019.

https://bit.ly/3eQudh9

Pure Storage Named Most Innovative Flash Memory Technology for Best of Show Award at Flash Memory Summit 2020

Designed for modern applications and workloads, FlashArray//C is uniquely capable of using raw QLC flash to provide enterprise-grade performance and endurance, without the expense of over-provisioning or adding a persistent memory tier.

https://prn.to/3lpCfjt

Microsoft urges users to stop using phone-based multi-factor authentication

Alex Weinert, Director of Identity Security at Microsoft believes SMS and call-based MFA are “the least secure of the MFA methods available today” because of the ease with which determined attackers can intercept them

https://zd.net/36uVHVz

Friday 11/13

Malicious File Transfer: What You Need To Know About an Attacker’s Methods and Techniques To Protect Your Organization From Malware (FireEye)

41% of the year’s malware families were never seen before, and many breach and attack cases studied in the report began with phishing, one of the most prevalent ways that malware gets into a network.

https://bit.ly/2Uox7jF

Delivering Deeper Insight and Visibility for BIG-IP with Splunk (F5)

This fully Splunk-supported add-on makes it possible for Splunk administrators to pull network traffic data, system logs, system settings, performance metrics, and traffic stats from their BIG-IPs using syslogs, iRules, and the iControl REST API.

https://bit.ly/2IAUF20