Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/2 Citrix Expands Digital Workspace Security Offerings The Citrix Ready Workspace Security Program provides a choice of leading security vendors that complement Citrix solutions, allowing people to securely work anytime, from anywhere, while simplifying how IT manages the environment. https://bwnews.pr/382Ydox McAfee debuts remote browser isolation solution, XDR platform McAfee has launched a selection of new cybersecurity offerings including remote browser isolation tools to tackle attacks in... read more.

  • November 13, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/26 Combatting BEC and EAC: How Cloud App Security Can Protect Your Company from Email Account Compromise (EAC) (Proofpoint) Attackers often combine EAC with impersonation tactics (e.g. display name spoof, domain lookalikes) as a means to maintain the deceptive email discussion with the target. https://bit.ly/34vKnsF Microsoft Teams Phishing Attack Targets Office 365 Users The initial phishing email displays the name “There’s new activity in Teams,” making it appear like an a... read more.

  • October 30, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/19 FireEye Named “Overall Infrastructure Security Solution Provider of the Year” in 2020 CyberSecurity Breakthrough Award Program The Mandiant Solutions group brings together the world’s leading threat intelligence and front-line incident response data with its continuous security validation platform to arm organizations with the tools needed to increase security effectiveness and reduce organizational risk. https://bit.ly/34dolee McAfee Delivers Affordable Education Bundle t... read more.

  • October 23, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/12 How Cyber Attacks Changed During the Pandemic The F5 Security Incident Response Team (F5 SIRT) helps customers tackle security incidents in real time. #F5 reviewed all the reported incidents from January through August 2020 to see how the pandemic changed the cyberthreat landscape. http://f5so.co/3D378F Pursue your unique cloud strategy with Citrix Citrix solutions are designed to reduce the complexity of your cloud migration, whether it’s part of a planned transition or an accelerat... read more.

  • October 19, 2020

By Nancy Rand, Posted in Security

When preparing to securely work from anywhere, it is tantamount that a zero trust policy be adopted. Locations and assets are not to be inherently trusted. A system of policies and software are needed to protect from malicious intent.  In August 2020, NIST published SP 800-207, the final version of their Zero Trust Architecture. It is available for download from: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf The tenets of zero trust are presented in section 2.1. They are... read more.

  • October 05, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/28 Getting the employee experience right (Citrix) While some companies were immediately successful with remote work, many felt their systems were stressed as they tried to deliver remotely what employees were used to in the office. https://bit.ly/2ScrqnH Special Delivery: Don’t Fall for the USPS SMiShing Scam (McAfee) Hackers are all too familiar with our reliance on our smartphones – and are eager to exploit them with stealthy tricks as a result. https://bit.ly/34ldYUz Tuesday 9... read more.

  • October 02, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/21 Combatting BEC and EAC: Authenticating Email with DMARC (Proofpoint) Because this protection takes place at the domain level, messages will be blocked regardless of their payload, whether it’s a message containing a malicious time-delayed URL, an attachment, or a BEC attack that has no malicious content at all. https://bit.ly/3mySY4K Pure Storage to Acquire Portworx, Creating the Industry's Most Complete Kubernetes Data Services Platform for Cloud Native Applications By combining Port... read more.

  • September 25, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/14 Apps in the Firing Line: The Enduring Power of DDoS Attacks (F5) DDoS attacks have continued to evolve, grow teeth, and wreak havoc. This is particularly true in the wake of COVID-19, with a number of industry reports from the past two quarters highlighting significant spikes across the world. https://bit.ly/3ixLw7M When is the right time to upgrade your SQL Server? (Pure Storage) The best way to go about your SQL Server upgrade is to coordinate the timing of it to include the full stack, f... read more.

  • September 18, 2020

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 9/8 Proofpoint and CyberArk Extend Partnership to Further Safeguard High-Risk Users with People-Centric Protection The Proofpoint and CyberArk partnership features a combination of layered defenses designed to stop threats before they reach users and apply policies and controls that ensure privilege accuracy. https://bit.ly/3bKwuJe Attackers Steal Outlook Credentials Via Overlay Screens on Legitimate Sites The emails imitated the technical-support team of the employee’s company (with &ldq... read more.

  • September 11, 2020

By Nancy Rand, Posted in Security

NIST and the PCI DSS Council have both published software development frameworks. PCI DSS published a blog today highlighting an interview between Kevin Stine, Chief of the Applied Cybersecurity Division at NIST and Troy Leach, SVP, Engagement Officer at PCI SSC.  This blog discusses the importance of secure software development and contains links to additional information. https://blog.pcisecuritystandards.org/nist-and-pci-ssc-find-common-ground-in-development-of-software-frameworks Additionally, Th... read more.

  • September 11, 2020