Monday 8/8
Behavioral Analysis and AI/ML for Threat Detection: Going Behind the Scenes on the Newest Detection Engine from Proofpoint (Proofpoint)
The new Supernova Behavioral Engine improves our already leading efficacy, while ensuring low false positives for customers. We’re also committed to transparency, especially given how much vendor noise there is around the use of AI/ML.
https://bit.ly/3QbYRmU
What Is SQL Injection? Identification & Prevention Tips (Varonis)
Applications tend to be at risk of high-profile vulnerabilities like SQL injection attacks. The results of a SQL injection attack vary, ranging from retrieving confidential data to altering an application’s logic.
https://bit.ly/3dg5jL5
Tuesday 8/9
Check Point announces its Azure Virtual WAN security solution (Check Point)
Check Point is excited to announce its Azure Virtual WAN security solution, with CloudGuard providing industry-leading threat prevention, zero trust segmentation and North-South and East-West cloud network security.
https://bit.ly/3SCTFKh
Life After Death—SmokeLoader Continues to Haunt Using Old Vulnerabilities (Fortinet)
CVE-2017-0199 and CVE-2017-11882 are almost over five years old, but they are still being exploited. Worse, both vulnerabilities have had official patches for some time, yet they continue to be exploited.
https://bit.ly/3p7l3ma
Wednesday 8/10
If you’re like a lot of #SMBs—around 70%—you don’t have the experience to effectively manage a #ransomware attack. Learn how our Ransomware Readiness Assessment can help your business. #Citrix #cybersecurity #SMBsecurity
https://bit.ly/3Q1FI6S
Your guide to Citrix graphics workload deployments with Citrix HDX 3D Pro (Citrix)
With the advent of more resource-intensive operating systems and common applications, graphics cards are not just for graphics-heavy users anymore. Options are available to either leverage a full or partial GPU depending on the requirements (keep reading for more on that).
https://bit.ly/3whDmcD
Securing 5G and Edge Computing Environments with Zero Trust (Palo Alto Networks)
The proliferation of devices, the massive increase in intelligence at the network edge, and multi-tenancy and multi-cloud deployments are the significant difficulties that lead to a perfect storm of security risk in 5G enterprise deployments.
https://bit.ly/3QgOxdc
Thursday 8/11
We would like to welcome Systems Engineer 1, Lex Phelan, to Gotham Technology Group. Working with our excellent Professional Services team, Lex will help us meet the growing industry demand for IT services.
https://www.linkedin.com/in/alexandra-phelan-824836174/#experience
Introducing AI-Powered Indicators of Attack: Predict and Stop Threats Faster Than Ever (CrowdStrike)
AI-generated indicators of attack (IOAs) fortify existing defenses by using cloud-based ML and real-time threat intelligence to analyze events at runtime and dynamically issue IOAs to the sensor.
https://bit.ly/3dkuQTm
CyberArk Acquires C3M, Accelerating Cloud Privilege Security and Cyber Risk Reduction (CyberArk)
As the number of identities continues to grow exponentially, we’re hitting the ground running to accelerate the delivery of Identity Security innovations that help organizations to analyze, monitor and secure access to public cloud resources and achieve measurable cyber risk reduction.
https://bit.ly/3dpGqfR
Friday 8/12
As #cyberattacks accelerate, #GothamTG is here to help you defeat #ransomware attacks, simplify infrastructure management, and provide all your users with an exceptional #VDI experience with @MicrosoftAzure. #Citrix #cybersecurity #infrastructure
https://bit.ly/3Jvn8Sy
Delivering Multicloud Agility with Software-defined Storage (Pure Storage)
Pure worked closely with Microsoft to define Azure Shared Disks, the new Azure storage feature that allows you to attach a managed disk to multiple VMs simultaneously.
https://bit.ly/3zV2MgW
The Power of Open: Why Okta Joined the OCSF Project (Okta)
Okta believes that technology delivers more value and security when it’s built to integrate and interoperate with other tools and software providers—which is why we’re a founding member of the Open Cybersecurity Schema Framework coalition (OCSF).
https://bit.ly/3bNmiUA