Blog

By Nate Ravid, Posted in Infrastructure

Background A community-based health care system has several pairs of Citrix NetScalers deployed in their environment, which have been running for several years. Recently, a Citrix advisory was issued which required that the firmware be upgraded to avoid a vulnerability which had been discovered. All of the nodes were upgraded to version 12.1-65.25nc. There are several high availability (HA) pairs in deployment, and an orderly upgrade was performed on all pairs. However, after the upgrade, Application Deli... read more.

  • February 03, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/30 Why Small Businesses Choose CrowdStrike (CrowdStrike) A cyberattack can cause significant damage to any organization. But for SMBs, a security incident that causes productivity loss, financial trouble or reputation harm can be devastating. https://bit.ly/3DpxJMM Introducing Automated Posture Management: Fix Cloud Security Risks with One-Click (Varonis) With how quickly SaaS and IaaS apps add new features and functionality, it can be difficult to make sure they’re always configured pro... read more.

  • February 03, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/23 3 Easy Steps for End-to-End XDR with CrowdStrike and Zscaler (CrowdStrike) With the erosion of the corporate network perimeter and increased employee access to sensitive information from remote locations, corporate endpoints are left out in the wild and are often difficult to monitor for suspicious activity. http://bit.ly/3WsqIBz Fewer ransomware victims are paying up. But there's a catch Cyber criminals are finding it harder to make money from ransomware attacks. But that doesn't mean rans... read more.

  • January 27, 2023

By Ed Bratter, Posted in Infrastructure

If you are confused about Azure Active Directory (AD) hybrid join, what it is, when to use it, and how to set it up, keep reading. Azure AD hybrid join is for Windows devices and is one of three methods to associate devices to Azure AD: Azure AD registered, Azure AD joined, and Hybrid Azure AD joined. This article focuses exclusively on Azure AD hybrid joins.. If you are using federated management via AD FS or a third-party tool, the hybrid join process is slightly different. What is Azure AD Hybrid Join? ... read more.

  • January 27, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/16 2023 Trends: Disparities emerge in cybersecurity capabilities between private and public organizations (Cybersixgill) Come 2023, in the United States – there will be different experiences for the government versus companies, with the private sector on its own regarding the increasing number and ferocity of attacks – as they currently are. http://bit.ly/3GJNajR SRE Brings Modern Enterprise Architectures into Focus (F5) There’s more to assessing the performance and reliabili... read more.

  • January 20, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/9 Why Intelligent Privilege Controls Are Essential for Identity Security (CyberArk) Intelligent privilege controls must work in conjunction with one another to secure access for every identity. Continuous and constant monitoring and analysis of all activities of every identity allow organizations to detect and respond to unusual behavior. https://bit.ly/3WYBiS3 Learning From the Past — Ten 2022 Cybersecurity Events to Know (Palo Alto Networks) Threat actors are tremendously fond of recyc... read more.

  • January 16, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/19 Introducing Pure Storage FlashRecover//S, Powered by Cohesity (Pure Storage) Jointly architected by Pure Storage and Cohesity, FlashRecover//S is designed to deliver a powerful yet easy-to-use solution with multiple levels of built-in ransomware protection. https://bit.ly/3HMXYjb 2023 Cybersecurity Trends We’re Tracking (CyberArk) Cybersecurity doesn’t happen in a vacuum. Evolving attack trends, world events, regulatory changes, shifting organizational priorities and many other... read more.

  • January 06, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/12   Client-Side Defense: The Missing Piece in Your Holiday Security Armor (F5) Without visibility into the code that runs in your environment, companies cannot detect when code has changed or been compromised. These scripts provide threat actors a wide attack surface to exploit, allowing security incidents to occur directly in the customer’s browser without the user or merchant realizing it. https://bit.ly/3iWkbBa Pure Storage CEO: ‘The Days Of The Hard Disk In The Data Cent... read more.

  • December 16, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/5 Cloud Migration On Your Identity Security Terms (CyberArk) Companies of all sizes continue flocking to the cloud for its many business benefits: Reduced infrastructure costs, increased flexibility and more dynamic application development, to name a few. https://bit.ly/3Y1ydBp Citrix DaaS is now available on AWS Marketplace! (Citrix) Citrix and AWS are making it easier than ever to leverage joint solutions. With Citrix DaaS on AWS, customers can purchase, deploy, and manage their desktop dep... read more.

  • December 09, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/21 Prisma Cloud to Secure Supply Chain with Proposed Acquisition of Cider (Palo Alto Networks) The diversity, velocity and dynamic nature of today’s engineering ecosystem have introduced a wide array of new security challenges and gaps, setting the stage for the software supply chain to emerge as one of the most challenging and impactful attack vectors of the past few years. http://bit.ly/3Axbkfk A Comprehensive Look at Emotet’s Fall 2022 Return (Proofpoint) Emotet returned to the... read more.

  • December 05, 2022