Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/10 AI vs. AI: What Attackers Know Could Hurt You (Abnormal Security) AI is pushing the envelope for hackers and other bad actors, but it's also giving security professionals a powerful new weapon. In 2025, the biggest threat will be to organisations that ignore the writing on the wall and continue to pour resources into solutions that are no match for AI-driven attacks. https://abnormalsecurity.com/blog/ai-vs-ai-attackers-could-hurt-you Reimagining Your SOC: Overcoming Alert Fatigue with A... read more.

  • February 14, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/3 6 building blocks of a winning identity security strategy (Delinea) Identity strategy is not just about ensuring humans and non-humans have the right access; it's also about enhancing the security mechanisms that protect sensitive information from unauthorized access and breaches. https://delinea.com/blog/6-building-blocks-of-a-winning-identity-security-strategy Tuesday 2/4 Staying Ahead: Proactive Cybersecurity in the Era of Evolving Threats (Adlumin) By leveraging advancements in artifici... read more.

  • February 07, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/27 The anatomy of a Toxic Combination of Risk (Wiz) In cloud security, the key to proactively managing your attack surface is understanding how different risk factors combine to create attack paths that would lead to significant business impact. In this blog, we’ll explore how cloud security solutions can uncover these "toxic combinations" of risk and why certain tools are better equipped to do so. https://www.wiz.io/blog/the-anatomy-of-a-toxic-combination-of-risk Staying Ahead: Proactive... read more.

  • January 31, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation Safeguarding your software ecosystem is crucial, and ensuring only authorized libraries are used is like assembling a trusted team of superheroes. CIS Safeguard 2.6: Allowlist Authorized Libraries epitomizes the meticulous selection process of the Avengers’ roster in the Marvel Universe. The Avengers' Assembly Just as Nick Fury carefully selects each Avenger based on their abilities and trustworthine... read more.

  • January 28, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/20 CIS Safeguard 2.5: Allowlist Authorized Software https://www.gothamtg.com/blog/cis-safeguard-25-allowlist-authorized-software Balancing the cost and complexity of investing in your identity security strategy (Delinea) For organizations of all sizes, investing in a robust identity security strategy is crucial. The move towards platformization and smart consolidation offers a streamlined path forward, enabling businesses to manage complexities more effectively while aligning with enterprise pr... read more.

  • January 24, 2025

By Timothy Karl, Posted in Infrastructure, Virtualization

Citrix Cloud DaaS has introduced significant upgrades to its backup and restore capabilities, ensuring that businesses can maintain continuity and resilience effortlessly. Here’s a look at what’s new and how these features can benefit your organization. Scheduled and On-Demand Backups: The updated backup feature allows administrators to schedule backups according to their specific needs. This can be set up to occur at regular intervals, ensuring that all critical data is securely backed up wi... read more.

  • January 22, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation Ensuring that only trusted software can run on your systems is like casting a powerful spell to ward off dark forces. CIS Safeguard 2.5, "Allowlist Authorized Software," is akin to the protective enchantments used at Hogwarts School of Witchcraft and Wizardry to keep out dark magic. The Sorting Hat of Software Think of the allowlist as the Sorting Hat at Hogwarts. Just as the hat sorts students into houses... read more.

  • January 21, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/13 Understanding Indicators of Compromise and Their Role in Cybersecurity (Arctic Wolf) Indicators of Compromise continue to evolve and change as they are directly related to the constantly evolving nature of threats: malware strains appear and disappear, the expanding attack surface reveals new targets for exploit, and threat actors continue to shift their signatures in attempts to avoid detection. https://arcticwolf.com/resources/blog/understanding-indicators-of-compromise-and-their-role-in-cy... read more.

  • January 17, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation Keeping an accurate and up-to-date inventory of software is essential. CIS Safeguard 2.4, "Utilize Automated Software Inventory Tools," ensures that this task is handled with the precision and efficiency reminiscent of Tony Stark's (a.k.a. Iron Man) technological prowess from the Marvel Universe. Stark's Inventory Management Imagine Tony Stark, surrounded by his multitude of Iron Man suits and high-tech ga... read more.

  • January 14, 2025

By Eric Corcoran, Posted in Technology Week in Review

Thursday 1/2 How SASE Addresses Enterprise Network Challenges (Check Point) Organizations implementing SASE have reported improved operational efficiency, with streamlined management and reduced complexity leading to better resource allocation and faster response times to security incidents. https://blog.checkpoint.com/harmony-sase/how-sase-addresses-enterprise-network-challenges/ Citrix Secure Private Access delivers ZTNA in hybrid mode (Citrix) Implementing ZTNA organization-wide is not a trivial und... read more.

  • January 10, 2025