Blog

By Steve Gold, Posted in Security

If you’re a Mandy Patinkin fan like I am, you can quote many lines from The Princess Bride and have watched the acclaimed series Homeland, where he played CIA Director, Saul Berenson. In Season 7 of Homeland, Saul Berenson’s phone gets hacked because it is running outdated software. This scenario highlights several key points relevant to the importance of regular updates and patches. Exploitation of Vulnerabilities: The show demonstrates how hackers can exploit vulnerabilities in s... read more.

  • December 19, 2023

By Timothy Karl, Posted in Infrastructure

Overview Up until now, companies that were using Workspace on Citrix Cloud had to use a generic URL on the cloud.com domain. Citrix now gives you the ability to use a customer-owned domain, which helps with corporate branding, and makes it easier for users to remember the URL. It also helps with companies that are migrating from a NetScaler Gateway to Workspace, as they can migrate over their existing Gateway URL. For example, users at a company named AstraForge would typically access Workspace using a ge... read more.

  • December 19, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/11 Why Ransomware Actors Abuse Legitimate Software (CyberArk) Abusing organizations’ existing enterprise tools can help attackers blend in while they’re doing reconnaissance, and also aids them with privilege escalation and persistence. Coupling this technique with ransomware as a service (RaaS) also lowers the bar to entry by eliminating the need for attackers to create malware – something that requires skills, resources and time. https://www.cyberark.com/resources/blog/why-r... read more.

  • December 15, 2023

By Steve Gold, Posted in Security

So how does a round trip flight to Mars, with an extended layover for one lucky astronaut, relate to establishing a remediation process around vulnerabilities? Mark Watney, played by Matt Damon, finds himself stranded on Mars after his crew mistakenly believes he died during a severe storm and leaves the planet without him. The movie follows Watney as he faces numerous challenges and risks associated with survival on Mars. His approach to these challenges can be likened to a risk-based remediation strategy... read more.

  • December 12, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/4 Check Point Research Navigates Outlook’s Security Landscape: The Obvious, the Normal, and the Advanced (Check Point) Check Point Research (CPR) conducted a comprehensive analysis on ‘Outlook’, the desktop app in the Microsoft office suite, providing deeper insights into attack vectors, aiding both users and the security industry in understanding and mitigating potential risks. https://blog.checkpoint.com/security/check-point-research-navigates-outlooks-security-landscape-the... read more.

  • December 08, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/27 Business Email Compromise Attacks (BEC) Keep Growing — Here’s How to Increase Your BEC Cybersecurity (Arctic Wolf) It’s clear that Business Email Compromise (BEC) is quickly becoming a top tactic for threat actors, and they have become increasingly adept at not only spoofing email addresses but taking over accounts altogether once they are compromised — all with the goal of tricking users and stealing funds. https://arcticwolf.com/resources/blog/business-email-comprom... read more.

  • December 01, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/13 Identity Security’s Crucial Role in Safeguarding Data Privacy (CyberArk) In today’s digital age, data is the lifeblood of businesses and organizations, fueling decision-making, innovation and customer trust. And the benefits of being an effective data steward are often rooted in outcomes that don’t happen. https://bit.ly/3SG5vGg New Gartner® BEC Report: Recommendations Are Fully Supported by Proofpoint (Proofpoint) The rate of BEC attacks and the average loss per inci... read more.

  • November 17, 2023

By Steve Gold, Posted in Security

Always! I was going to continue to use movie or television references to highlight the importance of this CIS Safeguard but realistically, there isn’t one. There are plenty of examples where the lack of an effective Vulnerability Management Process caused a breach. Here are just a few: Equifax (2017): One of the most notable breaches in recent history. Equifax, a major credit reporting agency, suffered a data breach that exposed the personal information of 147 million people. The breach occurred du... read more.

  • November 15, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/6   Purity//FA 6.6.0: Paving the Way for FlashArray//E (Pure Storage) Purity//FA 6.6.0 delivers bold ESG benefits, enables storage consolidation, and simplifies storage provisioning along with other improvements for FlashArray customers. https://bit.ly/49gnOrc How to Secure Your Network Infrastructure (Arctic Wolf) Effective security operations are necessary to continuously monitor data centers and servers, user login activity, SaaS applications, cloud workloads, email systems, and mana... read more.

  • November 10, 2023

By Steve Gold, Posted in Security

This line from “The Fugitive” portrays Dr. Richard Kimble (played by Harrison Ford), a vascular surgeon who was wrongly convicted of his wife's murder. After escaping custody, he set out to prove his innocence while being pursued by Deputy Marshall, Samuel Gerard (played by Tommy Lee Jones). In a face-to-face standoff, Richard says, “I didn’t kill my wife.” Deputy Gerard responds with, “I don’t care.” One of the best responses to that line, in my humble opinio... read more.

  • November 07, 2023