Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/20 3 Ways Visualization Improves Cloud Asset Management and Security (CrowdStrike) While it’s important to understand the relationships and potential vulnerabilities of your cloud assets, the practice of managing these systems is complicated by the ever-changing nature of cloud environments. http://bit.ly/417Bwsr Ransomware Roundup – CatB Ransomware (Fortinet) CatB is a reasonably new entrant to the ransomware field, with samples only dating back to December 2022. The ransom demand... read more.

  • February 24, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/13   Make Compliance a Breeze with Modern Log Management (CrowdStrike) While regulations vary by country and industry, nearly every organization must store compliance-relevant information for a certain period of time. The trouble comes when you’ve got an assortment of tools emitting logs in an inconsistent fashion. http://bit.ly/3DY9Tbm Machine Creation Services support for catalogs with Azure VM extensions (Citrix) Adding Azure VM extensions to your machine catalogs is a powerful... read more.

  • February 17, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/6 CrowdStrike Announces Expanded Service Integrations with AWS (CrowdStrike) On January 31, 2023, AWS announced CloudTrail Lake Partner Integrations, with CrowdStrike signing on as a launch partner. With this integration, organizations get the opportunity for a consistent security posture between on-premises workloads and those running in the AWS cloud. http://bit.ly/3jwQeYY Ransomware Roundup – Trigona Ransomware (Fortinet) The Ransomware Roundup report aims to provide readers with brie... read more.

  • February 10, 2023

By Nate Ravid, Posted in Infrastructure

Background A community-based health care system has several pairs of Citrix NetScalers deployed in their environment, which have been running for several years. Recently, a Citrix advisory was issued which required that the firmware be upgraded to avoid a vulnerability which had been discovered. All of the nodes were upgraded to version 12.1-65.25nc. There are several high availability (HA) pairs in deployment, and an orderly upgrade was performed on all pairs. However, after the upgrade, Application Deli... read more.

  • February 03, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/30 Why Small Businesses Choose CrowdStrike (CrowdStrike) A cyberattack can cause significant damage to any organization. But for SMBs, a security incident that causes productivity loss, financial trouble or reputation harm can be devastating. https://bit.ly/3DpxJMM Introducing Automated Posture Management: Fix Cloud Security Risks with One-Click (Varonis) With how quickly SaaS and IaaS apps add new features and functionality, it can be difficult to make sure they’re always configured pro... read more.

  • February 03, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/23 3 Easy Steps for End-to-End XDR with CrowdStrike and Zscaler (CrowdStrike) With the erosion of the corporate network perimeter and increased employee access to sensitive information from remote locations, corporate endpoints are left out in the wild and are often difficult to monitor for suspicious activity. http://bit.ly/3WsqIBz Fewer ransomware victims are paying up. But there's a catch Cyber criminals are finding it harder to make money from ransomware attacks. But that doesn't mean rans... read more.

  • January 27, 2023

By Ed Bratter, Posted in Infrastructure

If you are confused about Azure Active Directory (AD) hybrid join, what it is, when to use it, and how to set it up, keep reading. Azure AD hybrid join is for Windows devices and is one of three methods to associate devices to Azure AD: Azure AD registered, Azure AD joined, and Hybrid Azure AD joined. This article focuses exclusively on Azure AD hybrid joins.. If you are using federated management via AD FS or a third-party tool, the hybrid join process is slightly different. What is Azure AD Hybrid Join? ... read more.

  • January 27, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/16 2023 Trends: Disparities emerge in cybersecurity capabilities between private and public organizations (Cybersixgill) Come 2023, in the United States – there will be different experiences for the government versus companies, with the private sector on its own regarding the increasing number and ferocity of attacks – as they currently are. http://bit.ly/3GJNajR SRE Brings Modern Enterprise Architectures into Focus (F5) There’s more to assessing the performance and reliabili... read more.

  • January 20, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/9 Why Intelligent Privilege Controls Are Essential for Identity Security (CyberArk) Intelligent privilege controls must work in conjunction with one another to secure access for every identity. Continuous and constant monitoring and analysis of all activities of every identity allow organizations to detect and respond to unusual behavior. https://bit.ly/3WYBiS3 Learning From the Past — Ten 2022 Cybersecurity Events to Know (Palo Alto Networks) Threat actors are tremendously fond of recyc... read more.

  • January 16, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/19 Introducing Pure Storage FlashRecover//S, Powered by Cohesity (Pure Storage) Jointly architected by Pure Storage and Cohesity, FlashRecover//S is designed to deliver a powerful yet easy-to-use solution with multiple levels of built-in ransomware protection. https://bit.ly/3HMXYjb 2023 Cybersecurity Trends We’re Tracking (CyberArk) Cybersecurity doesn’t happen in a vacuum. Evolving attack trends, world events, regulatory changes, shifting organizational priorities and many other... read more.

  • January 06, 2023