Monday 7/17
VMware's Purple Screen of Death
Similar to Microsoft’s Blue Screen of Death, the Purple Screen of Death occurs when there is a kernel panic in Linux variants that result in a system halt. This typically is due to a driver issue, hardware issue, or in my case, a recent patch.
https://www.gothamtg.com/blog/vmwares-purple-screen-of-death
Log4j Vulnerability: Are Organizations Still at Risk? (F5)
It’s been almost 2 years since the log4j vulnerability was exposed, and organizations are still playing catch-up as the broader problem continues to evolve.
https://bit.ly/3pWDlun
Brand Spoofing Prevention – Check Point Software Technologies’ AI-Powered Pre-emptive Zero Phishing Prevents Local and Global Brand Impersonation Attacks (Check Point)
Well-known brands, such as Microsoft, Google and LinkedIn, Wells Fargo, and Walmart, are frequently imitated by cybercriminals in their attempts to steal individuals’ personal information or payment credentials.
https://bit.ly/3PWLrhd
Tuesday 7/18
Do You Have Your Keys? ft. Bryon Singh, RailWorks Corporation
https://www.gothamtg.com/blog/do-you-have-your-keys
Threat Trends: Threat Actors Add .zip Domains to Their Phishing Arsenals (Fortinet)
Cybercriminals are always on the lookout for new opportunities and techniques to exploit, and the recent availability of '.ZIP' domains for public purchase has unfortunately created such an opportunity.
https://bit.ly/3Y0Goyj
The Top Cyber Attacks of June 2023 (Arctic Wolf)
Summer is here, and things are heating up in the cybersecurity sphere. June saw a third-party vulnerability spiral into the furthest-reaching cyber attack of the year thus far, while separate attacks cut into summer plans for gamers, vacationers, and commuters alike.
https://bit.ly/3XWtGR8
Wednesday 7/19
Why Organizations Must Reinforce Their Endpoint Security with a Modern Web Security Solution (Check Point)
Many organizations have attempted to address the security threats of remote work by doubling down on endpoint security. Endpoint security solutions are a valuable component of a corporate cybersecurity strategy, but they simply are not enough to protect the company and its users against the cyber threats that they face every day.
https://bit.ly/3K3Xbec
Conquer Complexity To Achieve Business Agility (FireMon)
Organizations find themselves at a crossroads – they must ensure that security doesn’t slow down innovation and that innovation doesn’t compromise security.
https://bit.ly/3XZR2VX
Thursday 7/20
Resiliency Is Top Priority in 2023 White House Cybersecurity Strategy (Pure Storage)
The White House released its updated Cybersecurity Strategy and one thing is clear: Data resiliency is the top priority for every country and organization.
https://bit.ly/3rBbkZU
Navigating the Compliance Danger Zones in Remote Work (Citrix)
In the rapidly evolving business landscape across all verticals, remote work has become the new normal, and no longer the exception. One of the major challenges for C-level executives and business owners is the protection of their organization’s data while ensuring the necessary regulatory compliance.
https://bit.ly/3NXpUT7
Friday 7/21
Building a Cloud Security Program From the Ground Up (Varonis)
Building a cloud security program from scratch can be daunting. How do you get started, and what should your first steps be?
https://bit.ly/470sMHC
The Future of Application Management is Filled with DaaS (Nerdio)
In today’s IT landscape, businesses are increasingly adopting Desktop-as-a-Service (DaaS) in addition to modern cloud management technologies and strategies. In fact, Gartner research into EUC (end user computing) spending predicts that all segments of the public cloud market, that underpin digital transformation and IT modernization, are expected to grow this year.
https://bit.ly/3Dui12t