This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On August 09, 2024

Monday 8/5

Introducing native Conditional Authentication to Citrix Cloud! (Citrix)

Prior to this release, only one type of authentication method was allowed natively. Multiple methods required the use of Adaptive Authentication which relies on NetScaler nFactor, which increases complexity.

https://www.citrix.com/blogs/2024/08/02/introducing-native-conditional-authentication-to-citrix-cloud/

Tuesday 8/6

The Perils of Insecure Networks ft. Bryon Singh, RailWorks Corporation

https://www.gothamtg.com/blog/the-perils-of-insecure-networks

The Promise and Perils of Building AI Into Your Business (Palo Alto Networks)

Business use of AI apps spans nearly every type of application, including supply chain optimization, process automation, customer service chatbots, virtual assistants, data analysis, logistics monitoring, fraud detection, competitive intelligence and more. But there are risks involved with this new technology.

https://www.paloaltonetworks.com/blog/2024/08/the-promise-and-perils-of-building-ai-into-your-business-applications/

Wednesday 8/7

5 Questions to Ask Before Migrating to Azure Virtual Desktop (Nerdio)

Moving to AVD can be a significant investment in time and budget, so it is important to weigh both operational and technical considerations to make sure the timing is right and that your organization is set up to succeed.

https://getnerdio.com/resources/5-questions-to-ask-before-migrating-to-azure-virtual-desktop/

Unified data storage: Manage data smarter, not harder (NetApp)

Unified data storage cuts out the excess to connect disparate infrastructures and dismantle data silos, offering a simpler way to manage data across a hybrid multicloud environment.

https://www.netapp.com/blog/unifed-data-storage-smarter-not-harder/

Thursday 8/8

Defusing AD-Based Risks | Best Practices for Securing Modern Directory Services (SentinelOne)

Active Directory systems are often targeted by threat actors due to a combination of common and obscure misconfigurations, recent vulnerabilities, and built-in functionalities. These weaknesses can be exploited by attackers to move laterally and vertically within a network environment, gaining unauthorized access and establishing persistence.

https://www.sentinelone.com/blog/defusing-ad-based-risks-best-practices-for-securing-modern-directory-services/

Securing Data in the AI Era: Introducing Check Point Harmony Endpoint DLP (Check Point)

With the rapid adoption of Generative AI tools to boost productivity, data is being shared at unprecedented rates. While this revolution in AI promises immense benefits, it also introduces new risks to data security.

https://blog.checkpoint.com/securing-user-and-access/securing-data-in-the-ai-era-introducing-check-point-harmony-dlp/

Friday 8/9

Top Identity Threats Your Organization Faces (Arctic Wolf)

Identity has risen in the ranks to become a top target for threat actors in recent years. From targeting Microsoft Active Directory (AD) to utilizing stolen credentials for privileged access, identity is now often the key to a cyber attack’s success.

https://arcticwolf.com/resources/blog/top-identity-threats-facing-your-organization/

Moving Beyond SIEM: 4 Essential Considerations for Advanced Cybersecurity (Adlumin)

Extended Detection and Response (XDR) solutions take SIEM solutions to the next level by ingesting data from logs across the entire network and increasingly leveraging artificial intelligence (AI) and machine learning (ML), surpassing the capabilities of legacy systems. These innovations revolutionize security operations, enabling organizations to achieve superior threat detection and response capabilities.

https://adlumin.com/post/moving-beyond-siem-4-essential-considerations-for-advanced-cybersecurity/