Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/31 Citrix Cloud Connectors: How they work and how to get the most from them (Citrix) Cloud Connectors unlock the advantages of cloud management by bridging on-prem and cloud deployments, without requiring complex networking or infrastructure configuration. https://bit.ly/3FvOzLO Cyber Threats Happen — Prevention, Protection and Recovery Tips (Palo Alto Networks) While there’s no way to predict a bad actor’s next move, we do know that people are the first line of defense, and... read more.

  • November 04, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/24 Recognizing, Reporting, and Preventing Phishing (Fortinet) What’s especially concerning as we look back at the first half of 2022 is that the number of new ransomware variants we identified increased by nearly 100% compared to the previous six-month period. https://bit.ly/3z92nI2 Passwords still dominate, and are causing headaches for everyone Password-spraying attacks relying on lists of millions of passwords leaked in the past decade, are on the rise, making MFA one of the most eff... read more.

  • October 28, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/17 A New Era of Email Security: Easier—and Even More Effective (Proofpoint) Email is the number one threat vector and a massive risk vector for breaches today, which is why it's crucial for organizations to have an effective, integrated set of controls to stop phishing attacks and other email-related threats. https://bit.ly/3eFHhdx Why Strong Passwords Alone Won’t Stop Identity-Based Attacks (CyberArk) No matter how strong your organization’s password policies and awareness... read more.

  • October 21, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/10 You’ve Enabled MFA — Great! This Cybersecurity Awareness Month, Focus on How and Where It’s Used (CyberArk) Thanks to repeated front-page news coverage, MFA fatigue attacks are likely high on your radar. For these, threat actors employ various digital and voice-based phishing techniques to steal credentials and then send repeated MFA push requests to a target’s mobile device to successfully dupe employees and third-party vendors. https://bit.ly/3CIRQWi Ransomware-as-... read more.

  • October 14, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/3 Q&A on Cyber Resiliency for Operational Technology (Fortinet) Fortinet’s CISO for Operational Technology, Willi Nelson, shares perspective on considerations when developing cyber resilience, covering fundamentals and strategic planning, to protect the convergence of IT and OT environments. https://bit.ly/3e2oEAe Hackers are testing a destructive new way to make ransomware attacks more effective Ransomware hackers are experimenting with a new kind of attack that, instead of encrypt... read more.

  • October 07, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/26 Benefits of an Insider Threat Management Program (Proofpoint) The success of an ITM program is completely dependent upon involving stakeholders beyond IT and information security. Since anyone in your organization could become a source of insider challenges, you need representation from all parts of your organization. https://bit.ly/3Rg23Ob Prevention-first MDR/MPR – Elevating Managed Detection and Response to the Next Level (Check Point) Check Point’s Mid-Year Report recently r... read more.

  • September 30, 2022

By Michael Hawkins, Posted in Security

In recent days, it has been widely reported that Uber suffered a significant intrusion into their network. While the extent of the damage is unknown, we do know about the sequence of events that allowed the breach to be successful. Below is a discussion of some of the known facts along with our own commentary on the situation. Most importantly, we provide lessons for others to break the chain of events, which can help businesses to avoid these types of attacks. 1st Link: An Uber employee configured an... read more.

  • September 29, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/19 Strengthening Your Defenses Against Cloud Threats with Proofpoint and CrowdStrike (Proofpoint) In this changing environment, enterprises must take a people-centric approach to cloud security and protecting their data – so users can securely access the web, cloud services, and private apps. https://bit.ly/3UfefS1 Fortinet Collaborates with AWS to Deliver Low Cost, High Performance NGFW Protection on AWS Graviton Instances (Fortinet) This new capability provides Fortinet customers with... read more.

  • September 23, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/12 Modernizing IT Starts with Infrastructure (F5) Modernizing infrastructure requires attention to its ability to support the tools and technologies in use to orchestrate the processes that carry out changes. https://bit.ly/3qwAaX2 Consolidated Identity Protection in a Unified Security Platform Is a Must-Have for the Modern SOC (CrowdStrike) The right way to address these challenges is a unified platform approach that seamlessly integrates telemetry from across customer endpoints, workloads, i... read more.

  • September 16, 2022

By Timothy Karl, Posted in Virtualization

On July 14, 2022, IGEL announced the general availability of Microsoft Teams optimizations in Azure Virtual Desktop (AVD) using IEGL OS endpoints. IGEL OS is the first Linux-based OS to support Teams optimizations with AVD. Prior to this, the Teams optimizations were only available in the AVD clients for Windows 10/11 and macOS. The media optimizations for Teams allow for local offloading of audio and video for calls and meetings. This means that the audio and video traffic bypass the virtual desktop sessi... read more.

  • September 13, 2022