By Eric Corcoran, Posted in Technology Week in Review

Monday 8/22 Citrix Features Explained: Improving end-user security with Citrix Secure Private Access (Citrix) Citrix Secure Private Access was created to balance security and user experience, delivering robust, adaptive, and VPN-less security without interfering with the preferred workflows of hybrid employees. Escaping Ransomware Jail: Protection Before, During, and After an Attack (Pure Storage) Ransomware isn’t going away anytime soon. It’s “not if but when.&... read more.

  • September 02, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/15 CrowdStrike and Industry Partners Release Open Cybersecurity Schema Framework (CrowdStrike) The OCSF is an open source effort among industry leaders to break down the data silos that hamper security teams’ efforts to detect, investigate and stop cyberattacks Extend Proofpoint DLP to Third Parties with ICAP (Proofpoint) With data expected to grow at 23% annually, automation and consolidation of security operations is essential if security teams are to keep up. Pr... read more.

  • August 19, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/8 Behavioral Analysis and AI/ML for Threat Detection: Going Behind the Scenes on the Newest Detection Engine from Proofpoint (Proofpoint) The new Supernova Behavioral Engine improves our already leading efficacy, while ensuring low false positives for customers. We’re also committed to transparency, especially given how much vendor noise there is around the use of AI/ML. What Is SQL Injection? Identification & Prevention Tips (Varonis) Applications tend to be a... read more.

  • August 12, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/25 New Global OT and Cybersecurity Report Outlines Key Challenges for Industrial Organizations (Fortinet) Besides providing the latest statistics on the state of OT cybersecurity, the 2022 State of Operational Technology and Cybersecurity Report offers insights on how best to handle OT vulnerabilities and how best to strengthen an organization’s overall security posture. LinkedIn Still Number One Brand to be Faked in Phishing Attempts while Microsoft Surges up the R... read more.

  • August 05, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/11 Wide Open Outbound Firewall Policy – Part 2 A loose outbound Internet policy may only become visible after a firm is affected by a ransomware event. Until then, it is too easy for firewall administrators to overlook the weakness of the loose outbound Internet policy. Data Privacy Requires Protection against Credential Stuffing (F5) Credential stuffing is a cybercrime whereby criminals test stolen credentials against websites in order to take over accounts. Crimi... read more.

  • July 25, 2022

By Michael Hawkins, Posted in Infrastructure, Security

In Part 1 of this series, we began talking about best practices for firewall policy rules that are applied to outbound access to the Internet. In Part 2, we’ll briefly discuss the human element and then circle back to actual policy prescriptions.  Effort vs Risk – The Human Element The firewall administrator is the person (or team) responsible for maintaining a secure firewall policy including the “outbound to Internet” rules. Sometimes the firewall admin role falls to a less... read more.

  • July 11, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/27 The Importance of a Consistent Security Policy (Palo Alto Networks) Building upon industry-leading security technologies in conjunction with strong technology partnerships, Palo Alto Networks can help you consolidate your approach to security while maintaining crucial IT business continuity. What is an Insider Threat? Definition and Examples (Varonis) The individual doesn’t need to be an employee, and the harm may not even be deliberate, but insider threats are... read more.

  • July 08, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/20 ICYMI: Ken Phelan, was joined by Gotham’s EUC & Cloud Practice Director, Brian Wagner, and Rubrik, Inc.’s Christopher Culver and Drew Russell for a discussion surrounding Modern Resiliency. Make device management simpler with Citrix Provisioning Services (Citrix) Citrix has made many optimizations and tweaks throughout the years to ensure that PVS performs at its best from the perspective of device check-ins, failover times, and sca... read more.

  • June 24, 2022

By Timothy Karl, Posted in Virtualization

Citrix Virtual Apps and Desktops 7.15 LTSR will reach End of Life (EOL) on August 15, 2022. Customers using this version who wish to remain on the LTSR track must upgrade to 1912 or 2203 LTSR before then or risk being on an unsupported platform. Besides supportability, there are additional benefits for upgrading to 1912 and 2203 LTSR. Additional OS Support for Infrastructure components and VDAs 7.15 LTSR supports up to Windows 10 for Desktop OS and Windows 2016 Server OS. Both 1912 and 2203 LTSR allow you... read more.

  • June 22, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/13 A True Converged Platform Starts with a Powerful Network Firewall (Fortinet) In these new hybrid network environments, security cannot function as a standalone solution. Instead, security must be seamlessly converged with the underlying network, enabling protections to dynamically adapt to a constantly shifting network. Paying Ransomware Paints Bigger Bullseye on Target’s Back Paying ransomware attackers doesn’t pay off and often paints a bigger target on... read more.

  • June 17, 2022