By Eric Corcoran, Posted in Technology Week in Review

Monday 8/19 Carbon Black Delivers New API Capabilities and Access Control on Its Cloud-Native Endpoint Protection Platform (EPP) Carbon Black’s latest innovation in the cloud gives security and IT teams granular control over the actions and data that individuals can access, providing administrators with greater control of data access and management within their security environments. Citrix a Leader in Unified Endpoint Management Citrix today announced that it has been posit... read more.

  • August 23, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/12 McAfee buys container security startup NanoSec McAfee said NanoSec's security capabilities will be applied to applications and workloads deployed in containers and Kubernetes environments, giving customers app-level segmentation for detecting and preventing threats. AWS To Expand VMware Cloud On AWS Availability Amazon Web Services plans to expand the availability of VMware Cloud on AWS from 16 AWS regions to all 21 of its cloud computing regions by the end of next ye... read more.

  • August 16, 2019

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 7/30 Capital One Announces Data Security Incident This event affected approximately 100 million individuals in the United States and approximately 6 million in Canada. Importantly, no credit card account numbers or log-in credentials were compromised and over 99 percent of Social Security numbers were not compromised. Robinhood admits to storing some passwords in cleartext Not all Robinhood users were impacted, but a company spokesperson could not reveal the exact number.... read more.

  • August 09, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/22 Fake FaceApp Challenge Apps Are Installing Malware. Here's What You Need To Know The first detections of the FaceApp fake were a week ago but, according to data, there have been 500 unique users infected within the last 48 hours. The rising tide of ransomware requires a commitment to best practices The long-term impact of this ransomware trend has to be a commitment to best practices. Let's start by not leaving the door unlocked. Adware is the... read more.

  • July 26, 2019

By Nancy Rand, Posted in Security

The PCI DSS Council released overview and mapping documents to map PCI DSS requirements to the NIST Cybersecurity Framework. As stated in the mapping document: The mapping covers all NIST Framework functions and categories, with PCI DSS requirements directly mapping to 96 of the 108 subcategories. The mapping is based on PCI DSS v3.2.1 and the Cybersecurity Framework v1.1, using the 2018-04-16_framework_v.1.1_core spreadsheet1 The PCI DSS documents show how PCI DSS requirements can help when working... read more.

  • July 23, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/15 Shopping On Amazon Prime Day? Keep An Eye Out For Phishing Scams Cybersecurity firm McAfee reported that a popular phishing kit, called 16Shop, has recently turned its attention to Amazon. While the kit has been designed to scam Apple customers, a modified version is now targeting Amazon shoppers just in time for one of the biggest shopping days of the year. Citrix SD-WAN takes the fast path to the cloud Citrix SD-WAN 11.0 is coming soon with new features for... read more.

  • July 19, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/8 Splunk Secure Mobile Access for iOS Splunk has now released its Splunk Connected Experiences suite of mobile applications, leveraging the new Splunk Cloud Gateway application, to provide secure access to on-premises Splunk Enterprise with no separate VPN software required. Instead, the Cloud Gateway app on Splunk Enterprise communicates with the mobile apps through a secure, transparent, cloud-based service maintained by Splunk. CrescentCore Mac Malware Outsmarts Apple:... read more.

  • July 12, 2019

By Brian Wagner, Posted in Infrastructure, Security, Storage

One of the most common attack vectors for cloud servers is through Remote Desktop Protocol (RDP) or Secure Shell (SSH). When administrators build servers in the cloud, Microsoft and AWS had typically assigned a public IP to ease management of the servers. There is no VMware Console equivalent in the cloud, so RDP or SSH are the only way to manage a server. The problem starts when that public IP is assigned. Hackers are constantly running scans on the IP ranges owned by the cloud providers, and as soon as a... read more.

  • July 10, 2019

By Tom Stanley, Posted in Infrastructure

Splunk is shining its light on Dark Data and enabling companies to extract real business value from their machine data. As the value of that newly exposed information increases, it is important to be able to access it from anywhere, even from mobile devices. Although a Splunk mobile app has been available for a few years, connecting to an on-premises Splunk Enterprise deployment was difficult. The mobile device needed some type of VPN software to access Splunk dashboards, or there were more complicated meth... read more.

  • July 01, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/24 Getting Started with Citrix Workspace and On-Premises Virtual Apps and Desktops For those customers that still have on-premises Virtual Apps and Desktop deployments, implementing the Workspace service offers an excellent opportunity to evaluate the user experience of Citrix Cloud and Workspace app. Customers can keep their on-premises NetScaler and StoreFront deployments, and still integrate their Virtual Apps and Desktops sites into Workspace. Hackers Are Targeting 1.5... read more.

  • June 28, 2019