Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/31 Policy Evasion: Evasive Techniques You Need to Understand to Prevent Breaches and Attacks (FireEye) In today’s world, security must be top of mind for everyone within an organization, and that means setting and adhering to cyber security policies are essential to preventing breaches and attacks. https://bit.ly/32Vhfcv What’s the problem with a VPN and a regular browser for remote access? (Citrix) Organizations can provide access to internal web apps and resources with a VPN and... read more.

  • September 04, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/17 Online and offsite: the future of training and consultancy? (F5) As offices gradually re-open across the world, the question arises of how many of our old working habits we will return to. http://f5so.co/70FD4B Forescout Sets a New Standard for Securing the Enterprise of Things The new integrations allow organizations to reduce attack surface, maintain compliance and minimize breach impact across IT, IoT, healthcare and operational technology (OT) environments. Continuous monitoring of segm... read more.

  • August 21, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/10 Cisco Completes Acquisition Of ThousandEyes Cisco's strength in network and application performance, combined with visibility into the internet enabled by ThousandEyes, now allows customers to have an end-to-end view into the digital delivery of applications and services over the internet. https://prn.to/3kxZ9VC An Exploration of Files and Objects for Data Storage (Pure Storage) Since files and objects are both important, widely used forms of data representation, supporting both in one syst... read more.

  • August 14, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/3 Citrix Commits To $1B Cloud Spend With Unnamed Provider Under the new multi-year agreement, Microsoft Azure – Microsoft’s cloud platform – will “a preferred cloud platform” for Citrix. Citrix will move its existing on-premises customers to Microsoft Azure to help enable their employees to work anywhere across devices, and the two companies will provide joint tools to facilitate the transition. https://bit.ly/3i3sJjM The Log Data Conundrum: How to Get it Right at... read more.

  • August 07, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/27 Distributed but Connected: Enabling today’s remote digital workforce (Citrix) As restrictions continue to ease, businesses can take a step back, work out their strategy, select the right partners, and ensure they are doing remote working in a way that empowers their employees to do their best work and that will be sustainable over the long term. https://bit.ly/2X0so9C FBI warns of new DDoS attack vectors: CoAP, WS-DD, ARMS, and Jenkins The purpose of the alert is to warn US companies... read more.

  • July 31, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/20 Cisco releases security fixes for critical VPN, router vulnerabilities Over this week, Cisco added its own contribution, with the networking giant releasing patches for 34 bugs, the most severe of which can be exploited to conduct remote code execution and privilege escalation attacks. https://zd.net/2OG41JV Check Point IoT Protect Uses Automation and Threat Intelligence to Prevent the most advanced IoT cyber-attacks Connecting IoT devices to your network extends the attack surface for cybe... read more.

  • July 24, 2020

By Nancy Rand, Posted in Security

NIST published links to GDPR and ISO crosswalks to the NIST Privacy Framework. These are published by Microsoft (for ISO/IEC 27701) and the Enterprivacy Consulting Group (for the GDPR-Regulation 2016/679). https://www.nist.gov/privacy-framework/resource-repository/browse/crosswalks/gdpr-crosswalk-enterprivacy-consulting-group https://www.nist.gov/privacy-framework/resource-repository/browse/crosswalks/isoiec-27701-crosswalk-microsoft Each spreadsheet provides a mapping between the framework and the GDPR... read more.

  • July 23, 2020

By Bert Amodol, Posted in Security

For the last several years, the news of companies being breached has grown exponentially. These breaches may have been ransomware incidents, data exfiltration, or account compromises. They seem to be multiplying daily and are not limited to a particular industry or company size. You have probably asked yourself what you would do if it happened to your company. The time to think about what to do is before it happens. Being prepared to deal with a breach goes a long way towards a quick recovery and returning... read more.

  • July 21, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/13 Why Good Cyber Security Starts with Great Data Management (NetApp) Above all else, good security management is predicated on good data management. Along every step of the security journey – from prevent to detect to respond – knowing where your data is, how to extract it, and how it interoperates across and beyond organizational boundaries are key to ensuring you protect yours and your customers’ most valuable intelligence. https://ntap.com/2OgLiEu This botnet has surged ba... read more.

  • July 17, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/29 Pure Storage Recognized as a Leader in Enterprise Flash Array Storage and Object Storage Categories TrustRadius has recognized both FlashArray and FlashBlade as 2020 Top Rated Award winners. With a combined average trScore of 9/10 and more than 350 verified customer reviews and ratings, FlashArray won in the Enterprise Flash Array Storage category and FlashBlade won in the Object Storage category. https://bit.ly/3eJtLjD Okta, CrowdStrike, Netskope, and Proofpoint Join Together to Secure Remo... read more.

  • July 10, 2020