Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/28 Make Internet Access Safe - Adopt Zero Trust Network Security! (Palo Alto Networks) As applications move to the cloud and users work from anywhere, securing internet access has moved to the forefront in the battle against cybercriminals. https://bit.ly/3qx9Ifl 5 White House Recommendations for Modern Data Protection Against Ransomware (Pure Storage) In response to these increasing cyber threats, the White House recently raised ransomware to the top of the national security agenda, issuing a... read more.

  • July 09, 2021

By Timothy Karl, Posted in Infrastructure, Security

With anti-malware scanning software it is very important to have the proper malware exclusions in place. A misconfiguration of these settings may lead to performance issues which can may cause outages of critical applications and services due to file contention and locking. IT administrators need to find a balance between a malware-free environment and affecting the reliability and performance of any applications or services. Anti-malware exclusions can come from a variety of sources. Each anti-malwar... read more.

  • July 02, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/21 Getting on Target: Attacker’s Perspective of your Attack Surface Join Randori and Gotham for a virtual lunch on June 23rd at 12PM Famous hacker, Aaron Portnoy (featured on the cover of Time magazine), will break down how hacker’s prioritize vulnerabilities on your attack surface. Attendees will receive a $25 Uber Eats gift card, and the opportunity to get a free hacker assessment of your perimeter that includes a custom ShadowIT report. https://info.randori.com/gotham-lunch Our... read more.

  • June 25, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/14 Return of the Darkside: Analysis of a Large-Scale Data Theft Campaign (Varonis) The Darkside ransomware group announced their RaaS (Ransomware-as-a-Service) in August of 2020 via a “press release.” Since then, they have become known for their professional operations and large ransoms. https://bit.ly/2TZsyzf DataOps: Optimizing the Data Experience (Pure Storage) As organizations embark on digital transformation initiatives, they need to identify business processes and related ser... read more.

  • June 18, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/7 Streaming Live Data is the Heart of Observability (CrowdStrike) For security, much of the power of Humio comes from its ability to ingest live streaming data and make it immediately available to update alerts, visualizations, and perform queries. This is the backbone for achieving complete observability and making an environment more secure. https://bit.ly/3zavYiM Pure Storage: A Leader in the GigaOm Radar for High-Performance Object Storage Pure Storage was not only named as a leader in the... read more.

  • June 11, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/24 Executive Order on Cybersecurity Addresses Zero Trust In response to a growing number of serious cyber threats and incidents, President Biden has issued an Executive Order (EO) regarding improving the nation’s cybersecurity. https://bit.ly/2RATHbc Citrix TIPs: Choosing the best path for your Citrix upgrade Your Citrix upgrade doesn’t have to be a daunting experience, but it does require proper planning and change control to avoid disruption to your end users. https://bit.ly/3vt... read more.

  • June 04, 2021

By Ken Phelan, Posted in Security

In response to a growing number of serious cyber threats and incidents, President Biden has issued an Executive Order (EO) regarding improving the nation’s cybersecurity. I don’t personally read a lot of EOs, but I read this one, and if you’re part of the cyber industry, you probably should too. Given that you probably won’t, I’ll do some summarizing for you. There’s stuff about cooperation and standards, but I’d like to draw your attention to the EO’s requir... read more.

  • May 24, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/17   New Voice of the CISO Report Uncovers Top Security Concerns Across North America, EMEA, and APAC (Proofpoint) In our inaugural 2021 Voice of the CISO Report, we capture insights from 1,400 security leaders from around the world. The survey results present some interesting findings. https://bit.ly/2S1pKRq Check Point Software announces new Microsoft integrations at RSA® Conference 2021 to make enterprises more resilient The instant switch to remote work over a year ago challenged... read more.

  • May 21, 2021

By Nancy Rand, Posted in Security

The PCI Security Standards Council, PCI SSC, published a new version of the Secure Software Standard and its supporting program documentation on 4/29/2021. https://www.pcisecuritystandards.org/about_us/press_releases/pr_04292021 This version includes a new Terminal Software Module that contains requirements for software used on PCI-approved PIN Transaction Security (PTS) Point-of-Interaction (POI) devices. There are currently two other modules in this Standard: The “Core” module that contai... read more.

  • May 18, 2021

By Nancy Rand, Posted in Infrastructure, Security

The Cloud Security Alliance released two new research documents to provide guidance on Cloud Incident Response and Consuming and Providing APIs. https://cloudsecurityalliance.org/artifacts/cloud-incident-response-framework/?utm_source=email https://cloudsecurityalliance.org/artifacts/security-guidelines-for-providing-and-consuming-apis/?utm_source=email Cloud Incident Response provides a framework for handling the lifecycle of a security incident in the cloud and discusses what information is shared inte... read more.

  • May 18, 2021