Articles by 'Eric Corcoran'

Blog Author - Eric Corcoran

By Eric Corcoran, Posted in Technology Week in Review

Thursday 8/29 Introducing Automatic URL Categorization: Enhanced Security and Efficiency (Check Point) Our new feature, Automatic URL Categorization, helps your team make the most of their security policies. This capability leverages advanced machine learning and natural language processing (NLP) to provide superior URL classification, ensuring security policies are applied accurately. https://blog.checkpoint.com/security/introducing-automatic-url-categorization-enhanced-security-and-efficiency/ Inciden... read more.

  • September 06, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/19 Unmasking Styx Stealer: How a Hacker’s Slip Led to an Intelligence Treasure Trove and their Big Reveal (Check Point) During the debugging of Styx Stealer, the developer made a fatal error and leaked data from his computer, which allowed CPR to obtain a large amount of intelligence, including the number of clients, profit information, nicknames, phone numbers, and email addresses, as well as similar data about the actor behind the Agent Tesla campaign. https://blog.checkpoint.com/researc... read more.

  • August 23, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/12 Why a Data-resilient Architecture Is Critical for Recovery (Pure Storage) IT teams need to be prepared to recover quickly from an outage event, no matter the cause. See how Pure Storage can help speed your recovery efforts. https://blog.purestorage.com/solutions/why-a-data-resilient-architecture-is-critical-for-recovery/ Announcing the general availability of Citrix DaaS Backup + Restore (Citrix) Backup + Restore is now generally available for all Citrix DaaS customers. This powerful featur... read more.

  • August 16, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/5 Introducing native Conditional Authentication to Citrix Cloud! (Citrix) Prior to this release, only one type of authentication method was allowed natively. Multiple methods required the use of Adaptive Authentication which relies on NetScaler nFactor, which increases complexity. https://www.citrix.com/blogs/2024/08/02/introducing-native-conditional-authentication-to-citrix-cloud/ Tuesday 8/6 The Perils of Insecure Networks ft. Bryon Singh, RailWorks Corporation https://www.gothamtg.com/blog... read more.

  • August 09, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/29 Protecting Your Cloud Application Against Unknown Risks (Check Point) No system can ever be completely impervious to threats. Even with state-of-the-art protections in place, cloud security is never truly good enough if there remain unidentified vulnerabilities. https://blog.checkpoint.com/securing-the-cloud/protecting-your-cloud-application-against-unknown-risks/ Identity-based attacks and the identity attack chain (Delinea) Identity-based attacks progress in phases along what’s know... read more.

  • August 02, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/22 We're proud to have supported @AOfrockland this past Saturday during their walk around Rockland Lake. We are proud to sponsor The Arc of Rockland and support the individuals and families they serve. Click the link to learn more about The Arc of Rockland: https://arcofrockland.org/ 5 Threat Intelligence Solution Use Cases (Recorded Future) Cyber threats are becoming increasingly sophisticated and frequent, making it imperative for organizations to leverage cyber threat intelligence to stay a... read more.

  • July 26, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/15 Cybersecurity Stop of the Month: Reeling in DarkGate Malware Attacks from the Beach (Proofpoint) In a recent attack, a threat actor (TA571) used DarkGate to try to infiltrate over 1,000 organizations worldwide. The attack spanned across 14,000 campaigns and contained more than 1,300 different malware variants. https://www.proofpoint.com/us/blog/email-and-cloud-threats/darkgate-malware Tuesday 7/16 Preventing Unintentional Data Exposure ft. Bryon Singh, RailWorks Corporation https://www.got... read more.

  • July 19, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/8 The Growing Dichotomy of AI-Powered Code in Cloud-Native Security (Palo Alto Networks) Amidst the allure of newfound technology lies a profound duality – the stark contrast between the benefits of AI-driven software development and the formidable security risks it introduces. https://www.paloaltonetworks.com/blog/2024/07/the-growing-dichotomy-of-ai-powered-code-in-cloud-native-security/ Tuesday 7/9 You Cannot Pass ft. Bryon Singh, RailWorks Corporation https://www.gothamtg.com/blog/yo... read more.

  • July 12, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/1 Seeing the Unseen: Preventing Breaches by Spotting Malicious Browser Extensions (CrowdStrike) When an end user installs a browser extension, the permissions granted open the door to a world of possibilities — and vulnerabilities. Depending on what’s allowed, these extensions can access a veritable treasure trove of information. https://www.crowdstrike.com/blog/prevent-breaches-by-stopping-malicious-browser-extensions/ DMARC: Why It's Moving from a Best Practice to a Must-Have (Pro... read more.

  • July 05, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/17 5 Things to Do First During a Ransomware Attack (Pure Storage) Knowing the challenges you’ll face first and the immediate steps you can take during the early stages of an attack can help minimize loss, cost, and risk. https://blog.purestorage.com/perspectives/a-6-point-plan-for-the-during-of-a-data-breach/ Triage Your Cloud Security: Risk Prioritization Methods (CyberArk) Effective risk prioritization requires a nuanced understanding of risk dynamics and a strategic, adaptive approach... read more.

  • June 28, 2024