Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/24 Executive Order on Cybersecurity Addresses Zero Trust In response to a growing number of serious cyber threats and incidents, President Biden has issued an Executive Order (EO) regarding improving the nation’s cybersecurity. https://bit.ly/2RATHbc Citrix TIPs: Choosing the best path for your Citrix upgrade Your Citrix upgrade doesn’t have to be a daunting experience, but it does require proper planning and change control to avoid disruption to your end users. https://bit.ly/3vt... read more.

  • June 04, 2021

By Ken Phelan, Posted in Security

In response to a growing number of serious cyber threats and incidents, President Biden has issued an Executive Order (EO) regarding improving the nation’s cybersecurity. I don’t personally read a lot of EOs, but I read this one, and if you’re part of the cyber industry, you probably should too. Given that you probably won’t, I’ll do some summarizing for you. There’s stuff about cooperation and standards, but I’d like to draw your attention to the EO’s requir... read more.

  • May 24, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/17   New Voice of the CISO Report Uncovers Top Security Concerns Across North America, EMEA, and APAC (Proofpoint) In our inaugural 2021 Voice of the CISO Report, we capture insights from 1,400 security leaders from around the world. The survey results present some interesting findings. https://bit.ly/2S1pKRq Check Point Software announces new Microsoft integrations at RSA® Conference 2021 to make enterprises more resilient The instant switch to remote work over a year ago challenged... read more.

  • May 21, 2021

By Nancy Rand, Posted in Security

The PCI Security Standards Council, PCI SSC, published a new version of the Secure Software Standard and its supporting program documentation on 4/29/2021. https://www.pcisecuritystandards.org/about_us/press_releases/pr_04292021 This version includes a new Terminal Software Module that contains requirements for software used on PCI-approved PIN Transaction Security (PTS) Point-of-Interaction (POI) devices. There are currently two other modules in this Standard: The “Core” module that contai... read more.

  • May 18, 2021

By Nancy Rand, Posted in Infrastructure, Security

The Cloud Security Alliance released two new research documents to provide guidance on Cloud Incident Response and Consuming and Providing APIs. https://cloudsecurityalliance.org/artifacts/cloud-incident-response-framework/?utm_source=email https://cloudsecurityalliance.org/artifacts/security-guidelines-for-providing-and-consuming-apis/?utm_source=email Cloud Incident Response provides a framework for handling the lifecycle of a security incident in the cloud and discusses what information is shared inte... read more.

  • May 18, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/3 State of Application Strategy 2021: Unpacking the Current and Future State of Application Security and Delivery* (F5) The future of application security and delivery technologies is driven by digital transformation and the need to collect, analyze, and act on data to positively impact business outcomes. The future of business is digital, and that means applications—and the technologies that deliver and secure them—are the heart of business. https://bit.ly/3uhBiOx Between a Rock an... read more.

  • May 14, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/26 DNS Management Just Got Easier with General Availability of Primary DNS Service on F5 Cloud DNS As enterprises realize that they need a DNS solution capable of supporting their adaptive applications, they look for solutions that match their need for automation, speed, and ability to respond to infrastructure changes in seconds rather than hours. https://bit.ly/2PqKzVq The Need for Adaptive Cloud Security to Protect All Environments (Fortinet) Security needs to be end-to-end, following data... read more.

  • April 30, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/19 Hacking Operational Technology for Defense: Lessons Learned From OT Red Teaming Smart Meter Control Infrastructure (FireEye) Focusing collection, detection, and hunting efforts on assets or information that are likely to be compromised during these phases presents defenders with strategic opportunities to hunt for and detect targeted adversary activity before it poses a risk to control systems. https://bit.ly/3twseoP Microsoft Continues to be Most Imitated Brand for Phishing Attempts in Q1 2... read more.

  • April 23, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/12 It’s Time to Take a New Path to SASE (Forcepoint) With people and data moving everywhere, security has to be agile to keep up. Now, the key issue facing many organizations is how to most effectively provide safe access to corporate resources on the web, in cloud apps and in internal, private apps anywhere, while keeping data safe everywhere. https://bit.ly/3sbi1wq IcedID Banking Trojan Surges: The New Emotet? IcedID (a.k.a. BokBot), bears similarities to Emotet in that it’s a mo... read more.

  • April 16, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/5 Driving 2021 security initiatives with Citrix’s cloud-delivered security solution One of the most compelling reasons for current SD-WAN customers to adopt Citrix Secure Internet Access ties back to the unified approach across networking and security that greatly simplifies operations unlike any other solution on the market. https://bit.ly/2R970io Supply chain attacks: what we know about the SolarWinds ‘Sunburst’ exploit, and why it still matters (Check Point) What makes the... read more.

  • April 09, 2021