Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/24 Recognizing, Reporting, and Preventing Phishing (Fortinet) What’s especially concerning as we look back at the first half of 2022 is that the number of new ransomware variants we identified increased by nearly 100% compared to the previous six-month period. https://bit.ly/3z92nI2 Passwords still dominate, and are causing headaches for everyone Password-spraying attacks relying on lists of millions of passwords leaked in the past decade, are on the rise, making MFA one of the most eff... read more.

  • October 28, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/17 A New Era of Email Security: Easier—and Even More Effective (Proofpoint) Email is the number one threat vector and a massive risk vector for breaches today, which is why it's crucial for organizations to have an effective, integrated set of controls to stop phishing attacks and other email-related threats. https://bit.ly/3eFHhdx Why Strong Passwords Alone Won’t Stop Identity-Based Attacks (CyberArk) No matter how strong your organization’s password policies and awareness... read more.

  • October 21, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/10 You’ve Enabled MFA — Great! This Cybersecurity Awareness Month, Focus on How and Where It’s Used (CyberArk) Thanks to repeated front-page news coverage, MFA fatigue attacks are likely high on your radar. For these, threat actors employ various digital and voice-based phishing techniques to steal credentials and then send repeated MFA push requests to a target’s mobile device to successfully dupe employees and third-party vendors. https://bit.ly/3CIRQWi Ransomware-as-... read more.

  • October 14, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/3 Q&A on Cyber Resiliency for Operational Technology (Fortinet) Fortinet’s CISO for Operational Technology, Willi Nelson, shares perspective on considerations when developing cyber resilience, covering fundamentals and strategic planning, to protect the convergence of IT and OT environments. https://bit.ly/3e2oEAe Hackers are testing a destructive new way to make ransomware attacks more effective Ransomware hackers are experimenting with a new kind of attack that, instead of encrypt... read more.

  • October 07, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/26 Benefits of an Insider Threat Management Program (Proofpoint) The success of an ITM program is completely dependent upon involving stakeholders beyond IT and information security. Since anyone in your organization could become a source of insider challenges, you need representation from all parts of your organization. https://bit.ly/3Rg23Ob Prevention-first MDR/MPR – Elevating Managed Detection and Response to the Next Level (Check Point) Check Point’s Mid-Year Report recently r... read more.

  • September 30, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/19 Strengthening Your Defenses Against Cloud Threats with Proofpoint and CrowdStrike (Proofpoint) In this changing environment, enterprises must take a people-centric approach to cloud security and protecting their data – so users can securely access the web, cloud services, and private apps. https://bit.ly/3UfefS1 Fortinet Collaborates with AWS to Deliver Low Cost, High Performance NGFW Protection on AWS Graviton Instances (Fortinet) This new capability provides Fortinet customers with... read more.

  • September 23, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/12 Modernizing IT Starts with Infrastructure (F5) Modernizing infrastructure requires attention to its ability to support the tools and technologies in use to orchestrate the processes that carry out changes. https://bit.ly/3qwAaX2 Consolidated Identity Protection in a Unified Security Platform Is a Must-Have for the Modern SOC (CrowdStrike) The right way to address these challenges is a unified platform approach that seamlessly integrates telemetry from across customer endpoints, workloads, i... read more.

  • September 16, 2022

By Timothy Karl, Posted in Virtualization

On July 14, 2022, IGEL announced the general availability of Microsoft Teams optimizations in Azure Virtual Desktop (AVD) using IEGL OS endpoints. IGEL OS is the first Linux-based OS to support Teams optimizations with AVD. Prior to this, the Teams optimizations were only available in the AVD clients for Windows 10/11 and macOS. The media optimizations for Teams allow for local offloading of audio and video for calls and meetings. This means that the audio and video traffic bypass the virtual desktop sessi... read more.

  • September 13, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/22 Citrix Features Explained: Improving end-user security with Citrix Secure Private Access (Citrix) Citrix Secure Private Access was created to balance security and user experience, delivering robust, adaptive, and VPN-less security without interfering with the preferred workflows of hybrid employees. https://bit.ly/3R2tRWA Escaping Ransomware Jail: Protection Before, During, and After an Attack (Pure Storage) Ransomware isn’t going away anytime soon. It’s “not if but when.&... read more.

  • September 02, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/15 CrowdStrike and Industry Partners Release Open Cybersecurity Schema Framework (CrowdStrike) The OCSF is an open source effort among industry leaders to break down the data silos that hamper security teams’ efforts to detect, investigate and stop cyberattacks https://bit.ly/3JS8BjX Extend Proofpoint DLP to Third Parties with ICAP (Proofpoint) With data expected to grow at 23% annually, automation and consolidation of security operations is essential if security teams are to keep up. Pr... read more.

  • August 19, 2022