Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/16 Is Your Company Still Experiencing Digital Transformation Challenges? (Cisco) Digital transformation is essential for all businesses, from the smallest to the largest of enterprises. These businesses are striving to become more agile, innovate quickly, and respond to change faster – and they’re turning to modern applications to fuel that change. http://bit.ly/33dWzMm PCI DSS Contactless Payments In December 2019, the PCI SSC Council released documents on the PCI SSC Contactless... read more.

  • March 20, 2020

By Stephen Kilcoyne, Posted in Infrastructure, Security, Support

As the COVID-19 outbreak continues, it’s important to remember that we’re all in this together. Communities and companies are working together to help stem the tide of the outbreak. The most important thing we can all do right now is maintain social distance, and for many that means working from home.  In recent weeks, our customers have been relying on us to help them enable, monitor, and support wide-scale work from home initiatives. These efforts include extending existing Citrix enviro... read more.

  • March 18, 2020

By Nancy Rand, Posted in Security

In December 2019, the PCI SSC Council released documents on the PCI SSC Contactless Payments on Commercial Off-the-Shelf (COTS) (CPoC™) program operated and managed by PCI Security Standards Council, LLC supporting the Payment Card Industry (PCI) Contactless Payments on COTS (CPoC™) Standard. Payment Card Industry (PCI) Contactless Payments on COTS (CPoC™) Program Guide Version 1.0 December 2019 Payment Card Industry (PCI) Contactless Payments on COTS (CPoC™) Security and Test Re... read more.

  • March 16, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/9 Expanded Cloud Visibility in FireEye Helix With Netskope FireEye Helix will have visibility into thousands of alerts and events that Netskope generates every day. Customer data will be enriched with FireEye Threat Intelligence to help prioritize and evaluate all the threats happening across an enterprise. http://bit.ly/2TSXtJN Boldly Go Farther with Greater Efficiency for PAM (CyberArk) Version 11.3 of the CyberArk Privileged Access Security Solution introduces several new features to improv... read more.

  • March 13, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/2 Warning Issued For Millions Of Microsoft Windows 10 Users Every Windows 10 computer is vulnerable to a serious (and widespread) system hack unless they change the default settings for viewing files. http://bit.ly/2PBEhiw Ransomware – Pure’s Unique Mitigation Solution Immutability Plus via FlashBlade SafeMode is the key. This offers the ability to prevent backups stored on FlashBlade from being compromised by attackers, thus acting as a force multiplier on FlashBlade’s exist... read more.

  • March 06, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/17 The 2020 State of App Services: Apps, Automation, and Architectures (F5 Networks) The rise of cloud-native architectures should not be taken lightly. Their impact on everything from adoption of automation to the deployment of app services is not trivial. http://bit.ly/37CVnme Increasing Visibility Into Network and Application Performance is Key to Driving Business Innovation (Riverbed) Seven in ten C-Suite decision makers (70%) believe business innovation is  driven by improved visibil... read more.

  • February 21, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/10 A Queen’s Ransom: Varonis Uncovers Fast-Spreading “SaveTheQueen” Ransomware During our investigation, we found that the attacker used the SYSVOL share on the customer’s domain controller to help spread the malware and track infections. The attacker had likely obtained and used domain admin privileges to write files to SYSVOL. http://bit.ly/2vprM2b Facebook is Most Imitated Brand for Phishing Attempts: Check Point Research’s Q4 2019 Brand Phishing Report This re... read more.

  • February 14, 2020

By Ken Phelan, Posted in Uncategorized

Game theorists like to look at game play as a way of modeling human behavior. One of their favorite games is called the prisoner’s dilemma. You’ve probably heard of it. In summary, it goes like this: You and a partner commit a crime. You’re not caught in the act, but the police bring you both downtown for questioning. The police put you in separate rooms and question you. At this point, the following outcomes are possible: Option 1 - You both keep quiet and each spend one year in jail... read more.

  • February 12, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/3 Ransomware Meets Its Match With Automated Cyber Defenses (Varonis) Ransomware ain’t going away. After a dip in activity, 2019 saw a breath-taking spike — a 500% increase from the previous year — in ransomware victims, including over 700 health care providers, 100 state and municipal government agencies, and 80 universities and colleges. http://bit.ly/2OoW9N1 Increase in Emotet Spam Observed, Blocked by Symantec As Emotet activity increased, Symantec blocked as many as 1 mil... read more.

  • February 07, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/27 Fortinet removes SSH and database backdoors from its SIEM product Fortinet has released patches this month to remove two backdoor accounts from FortiSIEM, the company's Security Information and Event Management (SIEM) product. Due to the sensitive nature of the data processed by a SIEM product and its central role in a company's cyber-security defenses, any backdoor mechanism in these systems is considered a dangerous and highly critical vulnerability. https://zd.net/38Mi3Sf Old Scams Gettin... read more.

  • January 31, 2020