Articles by 'Eric Corcoran'

Blog Author - Eric Corcoran

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/23 Are You Using Everything in Your Citrix Cloud Subscription? Features like Citrix Enterprise Browser, Remote Browser Isolation (RBI), and Secure Private Access (SPA) are included in many Advanced Plus and Premium subscriptions, but often go unused. https://www.gothamtg.com/blog/are-you-using-everything-in-your-citrix-cloud-subscription Cloud Attacks Retrospective: Evolving Tactics, Familiar Entry Points (Wiz) Cloud environments are growing more complex—but attackers aren’t necess... read more.

  • June 27, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/16 AI Is Everywhere—But Security Teams Are Still Catching Up (Wiz) AI is no longer experimental—it’s embedded. According to a recent survey of 96 organizations conducted by Wiz and Gatepoint Research, 87% of respondents’ teams are already using AI services, often through platforms like OpenAI or Amazon Bedrock. But as AI adoption surges, security isn’t keeping pace. https://www.wiz.io/blog/ai-security-readiness-report Optimizing Workloads in a Multicloud World (Nut... read more.

  • June 20, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/9 No Excuses: Why Multi-Factor Authentication is Non-Negotiable (Check Point ) If you think your users’ passwords are secret, think again. Credential dumps from breached companies are traded daily on the dark web. Password reuse is rampant. Phishing attacks are more sophisticated than ever, and employees are fallible — always have been, always will be. https://blog.checkpoint.com/harmony-sase/no-excuses-why-multi-factor-authentication-is-non-negotiable/ Rethinking File Storage: Pure... read more.

  • June 13, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/19 Phishing Campaign Mimics Email Quarantine Notifications: 32,000 Emails Target 6,358 Customers (Check Point) Check Point researchers have identified a large-scale phishing campaign that exploits the guise of email quarantine notifications. This campaign, consisting of 32,000 emails, has targeted 6,358 customers across various regions. The primary objective of the attackers is to deceive recipients into providing their login credentials through a fake login page. https://blog.checkpoint.com/sec... read more.

  • June 06, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/12 6 Customer-proven Best Practices for Cyber-resilient Backup and Recovery (Pure Storage) From the 3-2-1-1-0 framework to indelible data to faster threat detection, cyber resilience best practices can help organizations safeguard their operations and recover quickly and confidently when the worst happens. https://blog.purestorage.com/perspectives/6-customer-proven-best-practices-for-cyber-resilient-backup-and-recovery/ April 2025 Malware Spotlight: FakeUpdates Dominates as Multi-Stage Campaign... read more.

  • May 16, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/5 ICYMI: On April 22, 2025, Gotham's CTO, Ken Phelan, was joined by Check Point Software's Head of U.S. East Sales, Mark Ostrowski, to discuss Check Point's latest Threat Report, their cybersecurity innovations involving artificial intelligence, and more. Click the link below for the full video. https://www.youtube.com/watch?v=WwTolJAStz4&t The Expanding Attack Surface: Stopping Account Takeovers at Your Front Door Is Critical (Proofpoint) Organizations must understand that there are count... read more.

  • May 09, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/28 Windows 10 Enterprise End of Life: What you need to know & next steps (Nerdio) As support ends, the risks stack up quickly. Without regular updates, virtual desktops running Windows 10 will become targets for cyberattacks, particularly in environments where endpoints are exposed to external traffic or house confidential information. https://getnerdio.com/resources/windows-10-enterprise-end-of-life-what-you-need-to-know-next-steps/ Proofpoint Innovations That Simplify Your Operations (Pro... read more.

  • May 02, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/21 Modern Cybersecurity Strategies for Linux Servers (CyberArk) Organizations can effectively bridge the gap between traditional and modern infrastructures by adopting enhanced flexibility, strong authentication support and the ability to integrate with existing security tools. This holistic approach can strengthen security and support the continuous evolution of cybersecurity practices. https://www.cyberark.com/resources/blog/modern-cybersecurity-strategies-for-linux-servers What Is Data Gover... read more.

  • April 25, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/14 Citrix and Unicon: Control the endpoint, control the experience (Citrix) When the acquisition was announced in January, we immediately saw the potential to create meaningful synergies. Citrix already leads in delivering virtual apps and desktops, zero trust access, and secure application delivery. By integrating Unicon’s secure endpoint OS and management capabilities, Citrix now offers end-to-end control across the entire technology stack. https://www.citrix.com/blogs/2025/04/09/citrix-... read more.

  • April 18, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/7 The Expanding Attack Surface: How One Determined Attacker Thrives in Today’s Evolving Digital Workplace (Proofpoint) While email remains the primary threat vector, cybercriminals are exploiting new channels like messaging collaboration platforms, cloud apps and file-sharing services. This has created a fragmented security landscape with disconnected point products, resulting in higher operational costs, and increasing security gaps. https://www.proofpoint.com/us/blog/email-and-cloud-thre... read more.

  • April 11, 2025