Monday 3/27
Protect Passwords, Don’t Just Manage Them: A Game Plan for CIOs and CISOs (CyberArk)
Today’s attackers assign a level of value to employees’ passwords they once reserved for privileged users’ credentials. Why? Workers now have a shocking amount of access to sensitive resources.
http://bit.ly/3JQqeB5
Simplify Array Monitoring with New App for Splunk (Pure Storage)
The new unified app and technical add-on for Splunk simplify monitoring by providing performance metrics and more for Pure FlashArray and FlashBlade.
http://bit.ly/3FUYSIQ
Tuesday 3/28
Introducing the new Microsoft Teams, now in preview
New Teams is built on a foundation of speed, performance, and flexibility, to help you save time, and work together more efficiently.
http://bit.ly/3Zn8kvg
Fork in the Ice: The New Era of IcedID (Proofpoint)
Proofpoint is tracking new variants of IcedID used by at least three threat actors. Initial analysis suggests this is a forked version with potentially a separate panel for managing the malware.
http://bit.ly/3lQyWr1
Wednesday 3/29
Meeting Cybersecurity Insurance Requirements and Protecting Privileged Access (Fortinet)
With Fortinet’s recent release of FortiPAM, organizations can now more easily meet requirements for cybersecurity insurance. FortiPAM offers a range of features and capabilities that ensure secure access to critical assets and includes zero trust network access (ZTNA) controls.
http://bit.ly/3KjcAIe
How to Map Identity Security Maturity and Elevate Your Strategy (CyberArk)
As your organization thinks about building its Identity Security program, there are two fundamental factors to consider in tandem: Capability breadth and deployment depth.
https://bit.ly/3ZonT5V
Thursday 3/30
Top Vulnerabilities in 2023 and How to Block Them (Check Point)
By the time malicious activities—ransomware, spoofed or forged emails, malware files or unknown computer processes—became visible, attackers had already gained access and laid the foundation for a successful campaign.
https://bit.ly/3zfOkAm
State of App Strategy 2023: Security at your Service. Literally. (F5)
We know from other industry research that when it comes to patching vulnerabilities there is a significant gap between discovery and closure that leaves businesses vulnerable to attack.
https://bit.ly/3K0LBzA
Friday 3/31
80 Cybersecurity Statistics and Trends [updated 2023] (Varonis)
As cybersecurity leaders seek to allocate resources to their most pressing 2023 priorities, it can be challenging to determine which areas of business deserve the most attention — and budget.
http://bit.ly/3K3U6dc
How Ransomware Works (Arctic Wolf)
Ransomware is everywhere. This nefarious attack vector is starting to dominate the cybercrime landscape, wreaking havoc and racking up massive damage across the globe.
https://bit.ly/3M6As2R