By Eric Corcoran, Posted in Technology Week in Review

Monday 9/19 Strengthening Your Defenses Against Cloud Threats with Proofpoint and CrowdStrike (Proofpoint) In this changing environment, enterprises must take a people-centric approach to cloud security and protecting their data – so users can securely access the web, cloud services, and private apps. Fortinet Collaborates with AWS to Deliver Low Cost, High Performance NGFW Protection on AWS Graviton Instances (Fortinet) This new capability provides Fortinet customers with... read more.

  • September 23, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/12 Modernizing IT Starts with Infrastructure (F5) Modernizing infrastructure requires attention to its ability to support the tools and technologies in use to orchestrate the processes that carry out changes. Consolidated Identity Protection in a Unified Security Platform Is a Must-Have for the Modern SOC (CrowdStrike) The right way to address these challenges is a unified platform approach that seamlessly integrates telemetry from across customer endpoints, workloads, i... read more.

  • September 16, 2022

By Timothy Karl, Posted in Virtualization

On July 14, 2022, IGEL announced the general availability of Microsoft Teams optimizations in Azure Virtual Desktop (AVD) using IEGL OS endpoints. IGEL OS is the first Linux-based OS to support Teams optimizations with AVD. Prior to this, the Teams optimizations were only available in the AVD clients for Windows 10/11 and macOS. The media optimizations for Teams allow for local offloading of audio and video for calls and meetings. This means that the audio and video traffic bypass the virtual desktop sessi... read more.

  • September 13, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/22 Citrix Features Explained: Improving end-user security with Citrix Secure Private Access (Citrix) Citrix Secure Private Access was created to balance security and user experience, delivering robust, adaptive, and VPN-less security without interfering with the preferred workflows of hybrid employees. Escaping Ransomware Jail: Protection Before, During, and After an Attack (Pure Storage) Ransomware isn’t going away anytime soon. It’s “not if but when.&... read more.

  • September 02, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/15 CrowdStrike and Industry Partners Release Open Cybersecurity Schema Framework (CrowdStrike) The OCSF is an open source effort among industry leaders to break down the data silos that hamper security teams’ efforts to detect, investigate and stop cyberattacks Extend Proofpoint DLP to Third Parties with ICAP (Proofpoint) With data expected to grow at 23% annually, automation and consolidation of security operations is essential if security teams are to keep up. Pr... read more.

  • August 19, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/8 Behavioral Analysis and AI/ML for Threat Detection: Going Behind the Scenes on the Newest Detection Engine from Proofpoint (Proofpoint) The new Supernova Behavioral Engine improves our already leading efficacy, while ensuring low false positives for customers. We’re also committed to transparency, especially given how much vendor noise there is around the use of AI/ML. What Is SQL Injection? Identification & Prevention Tips (Varonis) Applications tend to be a... read more.

  • August 12, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/25 New Global OT and Cybersecurity Report Outlines Key Challenges for Industrial Organizations (Fortinet) Besides providing the latest statistics on the state of OT cybersecurity, the 2022 State of Operational Technology and Cybersecurity Report offers insights on how best to handle OT vulnerabilities and how best to strengthen an organization’s overall security posture. LinkedIn Still Number One Brand to be Faked in Phishing Attempts while Microsoft Surges up the R... read more.

  • August 05, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/11 Wide Open Outbound Firewall Policy – Part 2 A loose outbound Internet policy may only become visible after a firm is affected by a ransomware event. Until then, it is too easy for firewall administrators to overlook the weakness of the loose outbound Internet policy. Data Privacy Requires Protection against Credential Stuffing (F5) Credential stuffing is a cybercrime whereby criminals test stolen credentials against websites in order to take over accounts. Crimi... read more.

  • July 25, 2022

By Michael Hawkins, Posted in Infrastructure, Security

In Part 1 of this series, we began talking about best practices for firewall policy rules that are applied to outbound access to the Internet. In Part 2, we’ll briefly discuss the human element and then circle back to actual policy prescriptions.  Effort vs Risk – The Human Element The firewall administrator is the person (or team) responsible for maintaining a secure firewall policy including the “outbound to Internet” rules. Sometimes the firewall admin role falls to a less... read more.

  • July 11, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/27 The Importance of a Consistent Security Policy (Palo Alto Networks) Building upon industry-leading security technologies in conjunction with strong technology partnerships, Palo Alto Networks can help you consolidate your approach to security while maintaining crucial IT business continuity. What is an Insider Threat? Definition and Examples (Varonis) The individual doesn’t need to be an employee, and the harm may not even be deliberate, but insider threats are... read more.

  • July 08, 2022