Articles by 'Eric Corcoran'

Blog Author - Eric Corcoran

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/7 What’s New in Citrix Workspace App: Security, Speed, and Experience (Citrix) The Citrix Workspace app is designed to provide users with a secure, easy-to-install client that delivers instant access to business-critical applications, desktops, and data from any device. As the first touchpoint it’s a key component to ensure secure access to your users and also essential for employee productivity. https://www.citrix.com/blogs/2024/10/01/whats-new-in-citrix-workspace-app-security-spee... read more.

  • October 11, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/30 Hybrid cloud environments are not safe from ransomware (ThreatDown) The preferred way to move laterally from on-premises systems to cloud environments are stolen credentials for accounts that have access to both. They use the stolen credentials to gain control of the network, eventually creating persistent backdoor access to the cloud environment, and deploying ransomware to on-premises systems. https://www.threatdown.com/blog/hybrid-cloud-environments-are-not-safe-from-ransomware/ The Dange... read more.

  • October 04, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/23 Understanding the Roles in the Ransomware-as-a-Service Ecosystem: Who’s Targeting Your Data Security Gaps (Bitdefender) Ransomware criminal organizations are now working like streamlined software companies and service providers, with several key roles facilitating this efficient operation. https://www.bitdefender.com/blog/businessinsights/understanding-the-roles-in-the-ransomware-as-a-service-ecosystem-whos-targeting-your-data-security-gaps/ New Phishing Campaign Exploiting Google App... read more.

  • September 27, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/16 Defending Against Attacks on Data with Rubrik and the CrowdStrike Falcon Platform (Rubrik) Organizations need a comprehensive view of both the threats targeting them and the data they are defending. This holistic perspective allows them to identify attacks targeting their data and prioritize their responses accordingly. https://www.rubrik.com/blog/technology/24/9/defending-against-attacks-on-data-with-rubrik-and-the-crowdstrike-falcon-platform Ransomware review: September 2024 (ThreatDown) ... read more.

  • September 20, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/9 Move to Azure Virtual Desktop—The Right Way (Nerdio) The first rule of AVD migration? Plan ahead. We can’t stress this enough. Rushing into a migration without a solid game plan is a recipe for disaster. https://getnerdio.com/resources/move-to-azure-virtual-desktop-the-right-way/ What Key Cyberthreats Do Small Businesses Face? (Bitdefender) Small businesses owners not only have limited resources to defend against cyberattacks, they also typically lack the time and knowledge to ke... read more.

  • September 13, 2024

By Eric Corcoran, Posted in Technology Week in Review

Thursday 8/29 Introducing Automatic URL Categorization: Enhanced Security and Efficiency (Check Point) Our new feature, Automatic URL Categorization, helps your team make the most of their security policies. This capability leverages advanced machine learning and natural language processing (NLP) to provide superior URL classification, ensuring security policies are applied accurately. https://blog.checkpoint.com/security/introducing-automatic-url-categorization-enhanced-security-and-efficiency/ Inciden... read more.

  • September 06, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/19 Unmasking Styx Stealer: How a Hacker’s Slip Led to an Intelligence Treasure Trove and their Big Reveal (Check Point) During the debugging of Styx Stealer, the developer made a fatal error and leaked data from his computer, which allowed CPR to obtain a large amount of intelligence, including the number of clients, profit information, nicknames, phone numbers, and email addresses, as well as similar data about the actor behind the Agent Tesla campaign. https://blog.checkpoint.com/researc... read more.

  • August 23, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/12 Why a Data-resilient Architecture Is Critical for Recovery (Pure Storage) IT teams need to be prepared to recover quickly from an outage event, no matter the cause. See how Pure Storage can help speed your recovery efforts. https://blog.purestorage.com/solutions/why-a-data-resilient-architecture-is-critical-for-recovery/ Announcing the general availability of Citrix DaaS Backup + Restore (Citrix) Backup + Restore is now generally available for all Citrix DaaS customers. This powerful featur... read more.

  • August 16, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/5 Introducing native Conditional Authentication to Citrix Cloud! (Citrix) Prior to this release, only one type of authentication method was allowed natively. Multiple methods required the use of Adaptive Authentication which relies on NetScaler nFactor, which increases complexity. https://www.citrix.com/blogs/2024/08/02/introducing-native-conditional-authentication-to-citrix-cloud/ Tuesday 8/6 The Perils of Insecure Networks ft. Bryon Singh, RailWorks Corporation https://www.gothamtg.com/blog... read more.

  • August 09, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/29 Protecting Your Cloud Application Against Unknown Risks (Check Point) No system can ever be completely impervious to threats. Even with state-of-the-art protections in place, cloud security is never truly good enough if there remain unidentified vulnerabilities. https://blog.checkpoint.com/securing-the-cloud/protecting-your-cloud-application-against-unknown-risks/ Identity-based attacks and the identity attack chain (Delinea) Identity-based attacks progress in phases along what’s know... read more.

  • August 02, 2024