This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On August 16, 2024

Monday 8/12

Why a Data-resilient Architecture Is Critical for Recovery (Pure Storage)

IT teams need to be prepared to recover quickly from an outage event, no matter the cause. See how Pure Storage can help speed your recovery efforts.

https://blog.purestorage.com/solutions/why-a-data-resilient-architecture-is-critical-for-recovery/

Announcing the general availability of Citrix DaaS Backup + Restore (Citrix)

Backup + Restore is now generally available for all Citrix DaaS customers. This powerful feature enables you to create on-demand and scheduled backups and restore deleted applications, policies, and more.

https://www.citrix.com/blogs/2024/08/09/announcing-the-general-availability-of-citrix-daas-backup-restore/

Tuesday 8/13

Establishing and Maintaining an Inventory of Service Providers ft. Bryon Singh

https://www.gothamtg.com/blog/establishing-and-maintaining-an-inventory-of-service-providers

July 2024’s Most Wanted Malware: Remcos and RansomHub Run Rampant (Check Point)

Check Point’s latest Threat Index has revealed RansomHub has remained the most prevalent Ransomware group. Meanwhile, researchers identified a Remcos Windows malware campaign exploiting a recent security software update.

https://blog.checkpoint.com/research/july-2024s-most-wanted-malware-remcos-and-ransomhub-run-rampant/

Wednesday 8/14

Attack Vectors at a Glance (Palo Alto Networks)

An attack vector is the method an attacker uses to get access to a target environment. Understanding which vectors result in the most successful attacks can help you reduce the likelihood an attacker succeeds at compromising your organization.

https://www.paloaltonetworks.com/blog/2024/08/attack-vectors-at-a-glance/

Emerging phishing campaign targeting AWS accounts (Wiz)

We were ultimately unable to identify the goals of the attacker in this case (for reasons that will be explained shortly), but we wanted to make available the relevant details and indicators so that others could check if they were affected.

https://www.wiz.io/blog/emerging-phishing-campaign-targeting-aws-accounts

How policy-based access control improves agility and security (Delinea)

Policy-based access controls provide guardrails that control access within certain parameters or thresholds. In this blog, you’ll learn how policy-based access controls reduce your risk of identity-based attacks and you’ll see how automating those controls can ensure consistency, reduce errors, and save you time.

https://delinea.com/blog/policy-based-access-control

Thursday 8/15

The Value of IR Planning and Incident Readiness (Arctic Wolf)

With cyber attacks increasing in frequency and damage, it’s more important than ever for organizations to understand that an incident of any scale is more of a “when” than an “if.”

https://arcticwolf.com/resources/blog/the-value-of-ir-planning-and-incident-readiness/

Seamless Transition to Windows 11 with IGEL OS (IGEL)

Windows 10 goes end of life on the 14th of October 2025. By that date, Microsoft will stop providing free software updates from Windows update, no technical assistance will be offered and lastly, there will not be any more security fixes.

https://www.igel.com/blog/seamless-transition-to-windows-11-with-igel-os/

Friday 8/16

Simplify Azure Virtual Desktop Management With Multi Entra ID Support (Nerdio)

With multiple environments to monitor, you might find yourself constantly switching from one environment to the next, which is a cumbersome process that lacks central visibility. This fragmentation doesn’t just complicate the workflow—it’s also inefficient and can lead to mistakes.

https://getnerdio.com/resources/simplify-azure-virtual-desktop-management-with-multi-entra-id-support/

Mastering Endpoint Security | A CISO’s Blueprint for Resilience (SentinelOne)

Endpoint protection agents and sensors are crucial for defending against malware and malicious behaviors. However, integrating these tools with complex operating systems and other security measures can introduce risks.

https://www.sentinelone.com/blog/mastering-endpoint-security-a-cisos-blueprint-for-resilience/