Monday 6/5
What Physical NICs Are Your VMs Using?
https://www.gothamtg.com/blog/what-physical-nics-are-your-vms-using
Non-disruptive Workload Mobility with ActiveWorkload (Pure Storage)
ActiveWorkload is a powerful tool that enables you to move workloads non-disruptively between FlashArray systems.
https://bit.ly/43JYtTc
Extending Zero Trust OT Security to Meet Air Gap Requirements (Palo Alto Networks)
These offerings were designed to help organizations stay secure while adapting to the tremendous amount of change occurring in OT from transformation initiatives, like Industry 4.0 and smart manufacturing.
https://bit.ly/3MQ15Ii
Tuesday 6/6
Need To Know Basis
https://www.gothamtg.com/blog/need-to-know-basis
Meet the biggest threat to your security, and how to protect your employees (Citrix)
We must recognize the large impact human behavior has on security and use this insight to design a security strategy that both protects employees wherever they work and keeps company data safe.
https://bit.ly/3MWx4Gu
Wednesday 6/7
Cyber Breach Remediation’s 5-Step Cycle (CyberArk)
Cybersecurity often feels like a numbers game, where professionals focus most on preventing and stopping attacks. But defenses can always be breached – and in today’s threat landscape, that probability is increasing.
https://bit.ly/3Cg0haI
New F5 Integration Makes Protecting Your Apps and APIs a Lot Easier (F5)
For example, March 2023 was the most prolific month for ransomware attacks in recent years—up 91% from February and 62% from March 2022. Moreover, the cost of cybercrime is expected to hit $8 trillion by the end of the year and reach $15 trillion by 2025.
https://bit.ly/3NgLRgR
Actionable Insights: Reduce Your Organization’s Risk from TOAD Attack Campaigns (Proofpoint)
A TOAD attack is a relatively new form of phishing attack that combines voice and email phishing techniques. Attackers aim to trick users into disclosing sensitive information over the phone, such as login credentials or financial data, by impersonating a trusted authority figure.
https://bit.ly/3ClT1Kc
Thursday 6/8
CrowdStrike Defines the Future of Cloud Security with One-Click XDR to Automatically Identify and Secure Unmanaged Cloud Assets (CrowdStrike)
These agent-based and agentless innovations enable customers to consolidate multiple cloud security point products into a single, unified platform for complete protection across the cloud security lifecycle.
https://bit.ly/4655sIi
Four Trends Shaping the Next-Generation Firewall Market (Fortinet)
As the threat landscape continues to evolve and modern enterprise environments grow more complex, it’s critical for vendors and IT teams alike to keep the pulse of the NGFW industry. Here are four powerful trends to watch.
https://bit.ly/3X0cGJh
Friday 6/9
Securing the Cloud in Modern Times | How Businesses Can Build Cohesive Cloud-Native Security Strategies (SentinelOne)
While the return on investment for using cloud technology is clear, embedding adequate security in all aspects of cloud applications, infrastructure, and data can prove to be a moving target.
https://bit.ly/3MUObsx
May 2023’s Most Wanted Malware: New Version of Guloader Delivers Encrypted Cloud-Based Payloads (Check Point)
Check Point Research reported on a new version of shellcode-based downloader GuLoader featuring fully encrypted payloads for cloud-based delivery.
https://bit.ly/3J756a5