This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On July 26, 2024

Monday 7/22

We're proud to have supported @AOfrockland this past Saturday during their walk around Rockland Lake. We are proud to sponsor The Arc of Rockland and support the individuals and families they serve.

Click the link to learn more about The Arc of Rockland:

https://arcofrockland.org/

5 Threat Intelligence Solution Use Cases (Recorded Future)

Cyber threats are becoming increasingly sophisticated and frequent, making it imperative for organizations to leverage cyber threat intelligence to stay ahead of potential cyber attacks.

https://www.recordedfuture.com/blog/threat-intelligence-use-cases

Why Implementing Identity Security Doesn’t Have to Be Complicated (CyberArk)

Identity security is not only a complex and flexible tool but also a vital and urgent one. The traditional perimeter-based security model is no longer sufficient in the era of cloud computing, remote work and mobile devices.

https://www.cyberark.com/resources/blog/why-implementing-identity-security-doesnt-have-to-be-complicated

Tuesday 7/23

Recognizing and Reporting Security Incidents ft. Bryon Singh, RailWorks Corp.

https://www.gothamtg.com/blog/recognizing-and-reporting-security-incidents

The Top Cyber Attack Vectors Organizations Face (Arctic Wolf)

The sheer volume of cyber attacks — ransomware, business email compromise (BEC), and others — has steadily ticked up year after year. Cybercrime is now the number one global business risk, rakes in trillions for cybercriminals, and has advanced far beyond simple “scam emails” and brute-force attacks.

https://arcticwolf.com/resources/blog/top-five-cyberattack-vectors/

Improving the Human Element in Cybersecurity (Adlumin)

The human element remains a critical vulnerability in cybersecurity, often overshadowed by the focus on technological solutions. Employees, frequently one of the weakest links in an organization’s security chain, play a pivotal role in maintaining or compromising data integrity.

https://adlumin.com/post/improving-the-human-element-in-cybersecurity/

Wednesday 7/24

Windows KMS License Activation Bug on Citrix and Azure Windows Server 2022

Microsoft stated that the license activation bug would be addressed in a future cumulative update. Although I have not received word that it has been fixed, I hope this blog provides insight into the bug's behavior and options to address it.

https://www.gothamtg.com/blog/windows-kms-license-activation-bug-on-citrix-and-azure-windows-server-2022

Require App Protection Policy for Managed iOS Devices

If you are responsible for creating Entra Conditional Access policies, you may have noticed that Microsoft has put the “Require approved client app” control on the soon-to-be-extinct list. Instead, the newer “Require app protection policy” control should be used.

https://www.gothamtg.com/blog/require-app-protection-policy-for-managed-ios-devices

Thursday 7/25

Unlock modern management with Citrix Workspace Environment Manager (Citrix)

Workspace Environment Management is a solution for Citrix on-premises and cloud environments that uses intelligent resource management and profile management technologies to deliver the best possible performance, desktop logon, and application response times for Citrix Virtual Apps and Desktops deployments.

https://www.citrix.com/blogs/2024/07/19/unlock-modern-management-with-citrix-workspace-environment-manager/

Check Point Research Reveals Q2 2024 Brand Phishing Trends: Microsoft Tops List While New Entries Signal Shifting Threat Landscape (Check Point)

Check Point Research ranks Microsoft as primary target in phishing attacks and notes the introduction of Adidas, WhatsApp and Instagram into the Top 10.

https://blog.checkpoint.com/research/check-point-research-reveals-q2-2024-brand-phishing-trends-microsoft-tops-list-while-new-entries-signal-shifting-threat-landscape/

How to Reduce Costs for All Workloads (Pure Storage)

In today’s fast-paced business environment, organizations are grappling with the challenge of IT optimization. Learn how Pure Storage empowers businesses to achieve high-performance storage affordably.

https://blog.purestorage.com/perspectives/you-dont-have-to-compromise-all-flash-storage-reduces-costs-for-all-workloads/

Friday 7/26

5 Ways That Nerdio Delivers More Than Cost Savings (Nerdio)

Offering customizable automation workflows tailored to the specific needs of an organization means that business processes are aligned with operational requirements, a crucial step in maintaining business continuity and ensuring IT services are always available and functioning optimally.

https://getnerdio.com/resources/5-ways-that-nerdio-delivers-more-than-cost-savings/

Mastering cloud security with custom roles: one more step towards democratization (Wiz)

Discover how Wiz extends its existing RBAC with the Custom Roles feature, enabling you to tailor user permissions, maintain security, and stay aligned with business needs.

https://www.wiz.io/blog/cloud-security-custom-roles-democratization