Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/13 CrowdStrike Enhances Cloud Asset Visualization to Accelerate Risk Prioritization (CrowdStrike) The massive increase in cloud adoption has driven adversaries to focus their efforts on cloud environments — a shift that led to cloud intrusions increasing by 75% in 2023, emphasizing the need for stronger cloud security. https://www.crowdstrike.com/blog/enhanced-cloud-asset-visualization/ CISA opens its malware analysis and threat hunting tool for public use (CSO Online) https://www.csoonl... read more.

  • May 24, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/6 Prisma SASE 3.0 — Securing Work Where It Happens (Palo Alto Networks) This unrestricted approach empowers users, but it also increases risk due to a lack of consistent security, control and visibility across devices. Security strategies must catch up, and Palo Alto Networks is once again leading that charge. https://www.paloaltonetworks.com/blog/2024/05/prisma-sase-3-0/ Understanding Risk-Based Vulnerability Management (Arctic Wolf) For all the concern about phishing, insider threats,... read more.

  • May 10, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/15 Understanding APIs and How Attackers Abuse Them to Steal Data (CyberArk) While essential and prevalent, APIs are potential attack vectors when not properly protected via machine identity security best practices. They can be exploited to expose sensitive data (e.g., customer lists, personally identifiable information (PII) and credit card details) while enabling application-to-application communication. https://www.cyberark.com/resources/blog/understanding-apis-and-how-attackers-abuse-them-to-... read more.

  • May 03, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/8 Improving Detection and Response: Making the Case for Deceptions (Proofpoint) How can you find and stop attackers more quickly? The answer lies in your approach. Let’s take a closer look at how security teams typically try to detect attackers. Then, we can better understand why deceptions can work better.  https://www.proofpoint.com/us/blog/identity-threat-defense/deception-technology-better-for-threat-detection-response-than-honeypots The Continuing Rise of Remote Code Execution (... read more.

  • April 12, 2024

By Steve Gold, Posted in Security

The iconic line uttered by Agent Smith, played by Hugo Weaving, to Thomas A. Anderson, aka Neo, played by Keanu Reeves, in The Matrix. If you’ve been living under a rock or in a good sized closet, The Matrix tells the story of how Neo is awakened to the reality that his entire existence has been within a digital simulation, leading him on a journey to fight against the machines that have enslaved humanity. This awakening is akin to the realization organizations must reach about the importance of cyber... read more.

  • April 09, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/1 Citrix Autoscale: Unlock better user experiences, maximize resource utilization, and achieve better cost management (Citrix) Citrix Autoscale is designed to help customers address these challenges by scaling resources based on real-time demand such as peak times, schedules, and session (single or multi-session) type in your on-premises and cloud environments. https://www.citrix.com/blogs/2024/03/29/citrix-autoscale-unlock-better-user-experiences-maximize-resource-utilization-and-achieve-better... read more.

  • April 05, 2024

By Steve Gold, Posted in Security

If you think hackers are only trying to get to your Windows machines, well, you’re wrong. In May 2018, the cybersecurity world was rocked by the discovery of VPNFilter, a highly sophisticated and destructive piece of malware that targeted routers and network-attached storage devices across the globe. Identified by Cisco's Talos Intelligence Group, VPNFilter highlighted a critical vulnerability in the very backbone of our internet infrastructure, affecting devices from well-known manufacturers, includi... read more.

  • April 03, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/25 Is your VPN reaching End of Maintenance? Don’t let it put you at risk (Check Point) A legacy VPN does one thing and one thing only: it connects remote workers to the company network. The problem is that most employees don’t need, and shouldn’t have, access to the entire network, just to specific applications and data within it. https://blog.checkpoint.com/security/embrace-the-future-of-remote-access-transitioning-from-legacy-vpns-to-sase/ Tuesday 3/26 Barbasol ft. Bryon Si... read more.

  • March 29, 2024

By Timothy Karl, Posted in Infrastructure, Virtualization

In today's age of digital collaboration, using tools like Microsoft Teams in virtual desktop infrastructure (VDI) environments is more important than ever. We've recently had customers ask how well the new Teams client will work in VDI, especially with support for classic Teams ending on June 30th. The new Teams version has some great new features, but there's a catch: it isn’t fully supported on Windows Server 2019 and doesn't work on Windows Server 2016 at all. This can be tricky for businesses usi... read more.

  • March 27, 2024

By Steve Gold, Posted in Security

Jurassic Park demonstrated isolation both in the literal sense, with the park being located on an isolated island, and in the operational sense, where different systems within the park are designed to function independently to prevent cascading failures. This dual approach to isolation is mirrored in the cybersecurity best practice of creating isolated instances of recovery data. The film underscores the consequences of system failures and the lack of adequate isolation measures, particularly when Dennis N... read more.

  • March 26, 2024