By Eric Corcoran, Posted in Technology Week in Review

Monday 12/13 EDR vs Enterprise Antivirus: What’s the Difference? (SentinelOne) For decades, organizations and businesses have invested in Antivirus suites in the hope of solving the challenges of enterprise security. But as the sophistication and prevalence of malware threats has grown over the last ten years, so the shortcomings of what is now referred to as “legacy” Antivirus have become all too apparent. Protect Yourself Against The Apache Log4j Vulnerability... read more.

  • December 20, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/6 Check Point CloudGuard Network Security streamlines operational efficiency with as-a-Service solution on AWS Check Point is honored and excited to take cloud security innovation to the next level through its integration with AWS Gateway Load Balancer and AWS Managed Gateway Endpoints. Password-stealing and keylogging malware is being spread through fake downloads Cybersecurity researchers disclose a newly discovered campaign that users custom malware to steal username... read more.

  • December 10, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/29 The top 10 FAQs from our Citrix Virtual Apps and Desktops webinar From on-premises environments to cloud and hybrid deployments, there is a ton to love about the latest updates. Fortinet Announces New Service Offerings on AWS, Including Custom-Built Cloud Architectures Fortinet is pleased to announce new Cloud Consulting Service offerings in AWS Marketplace to help customers simplify and future-proof their application journeys on AWS and across hybrid and multi-cloud... read more.

  • December 03, 2021

By Nancy Rand, Posted in Security

In November, Troy Leach, Senior Vice President, Engagement Officer for the PCI Security Standards Council (PCI SSC), and Suzie Squier, President of the Retail & Hospitality Information Sharing and Analysis Center (RH-ISAC), discussed the protection of payment data during this holiday season. In October, the PCI SSC blog focused on their Work from Home Security Awareness Training, which is available from the council.... read more.

  • November 29, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/15 5 Key E-Commerce Holiday Shopping Cyberattacks to Secure, Defend, and Protect Against (F5) Over 1 million stolen credentials are reported every day, and underground markets have industrialised cyber crimes and fraudulent activities. Automation, malicious bots, and manual attacks expose users and businesses to fraud, which led to a 65% increase in successful fraud attempts from 2019 to 2020. Tracking Upward and Innovating for our Customers—Together (Okta) Okta w... read more.

  • November 19, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/8 Reporting Phishing Simulations: The Essential Metric to Measure in Phishing Awareness (Proofpoint) Adding information about the reporting rate of simulations is a better way to understand user behavior change, than looking at the failure rate alone. The reporting rate demonstrates that users are “doing the good” and helping to secure the organization. Client vs. Clientless Zero Trust Network Access (Fortinet) Zero-trust network access (ZTNA) is the next ev... read more.

  • November 12, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/1 Black Friday and the Proliferation of Fake Ecommerce Sites (Fortinet) In the lead-up to this event, FortiGuard Labs has observed more and more scams involving counterfeit websites that appear to be legitimate ecommerce sites. We say “appear to be” because to the untrained eye these sites may look safe, but if you aren’t paying attention they can steal your payment (and possibly payment information) via a purchase you thought was legitimate. Proofpoint... read more.

  • November 05, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/25 Citrix Expands Security Offerings To Protect Hybrid Work The offering is designed to enable the modern, zero-trust approach to securing applications that remote work demands as it grants least-privilege access based on user behavior, continuously monitors user activities, creates security controls based on those behaviors and provides an all-in-one management and distributed enforcement across the entire environment. gMSA Guide: Group Managed Service Account Security... read more.

  • October 29, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/18 Introducing the all-new Citrix Workspace Browser! Citrix Workspace Browser combines the native capabilities of a Chromium-based browser with Citrix Cloud services, providing a state-of-the-art user experience for all enterprise use cases. #BeCyberSmart! How to Make the Most of Cybersecurity Awareness Month (Proofpoint) October is Cybersecurity Awareness Month—and it’s an ideal opportunity for your organization to provide safe computing reinforcement to yo... read more.

  • October 25, 2021

By Gotham, Posted in Infrastructure

This is a guest blog from Proofpoint, a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. SUMMARY  A manufacturing customer of Gotham’s has over 100 years of experience tailoring custom products to meet their customers’ most demanding specifications. They pride themselves on the ability to provide any size order, to any specification, in a wide variety of configurations, and shipped on-time, worldwide.  The customer work... read more.

  • October 22, 2021