This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On September 20, 2024

Monday 9/16

Defending Against Attacks on Data with Rubrik and the CrowdStrike Falcon Platform (Rubrik)

Organizations need a comprehensive view of both the threats targeting them and the data they are defending. This holistic perspective allows them to identify attacks targeting their data and prioritize their responses accordingly.

https://www.rubrik.com/blog/technology/24/9/defending-against-attacks-on-data-with-rubrik-and-the-crowdstrike-falcon-platform

Ransomware review: September 2024 (ThreatDown)

The decline in the number of people paying, despite the increase in attacks, indicates that many organizations are becoming better equipped to handle ransomware incidents—whether through better backups, more robust defenses, or simply refusing to negotiate with attackers, which is always a welcome development.

https://www.threatdown.com/blog/ransomware-review-september-2024/

Tuesday 9/17

Citrix and IGEL deliver industry’s first ZTNA solution for IGEL OS devices (Citrix)

With this integration, you can transition users from VPN to ZTNA to enable least-privilege access and enforce continuous security for your hybrid workforce. Citrix Secure Access agent is a pre-verified application in the IGEL App Portal that you can seamlessly deploy on IGEL OS.

https://citrix.com/blogs/2024/09/17/citrix-and-igel-deliver-industrys-first-ztna-solution-for-igel-os-devices/

Maintaining Up-to-Date Contact Information for Security Incidents

https://www.gothamtg.com/blog/maintaining-up-to-date-contact-information-for-security-incidents

Wednesday 9/18

5 Steps to Reduce Your Data Storage Headaches (Pure Storage)

When managing critical business data, complex workloads, and distributed environments, here are five ways to reduce the headaches associated with data storage.

https://blog.purestorage.com/perspectives/5-steps-to-reduce-your-data-storage-headaches/

Join Gotham's technical leaders on September 25th at 11:00 AM to learn what companies are doing to address things like cyberattacks, ransomware, cloud computing, end user computing and staff augmentation.

Click the link below to register:

https://www.eventbrite.com/e/gothams-ask-the-experts-webinar-tickets-1000241247497?aff=oddtdtcreator

Demystifying Data Protection in the Cloud: Runtime vs. At Rest (CrowdStrike)

Combining at-rest and runtime protection creates a holistic and resilient security posture, ensuring your organization’s data is fully protected in today’s complex cloud landscape.

https://www.crowdstrike.com/blog/demystifying-data-protection-in-the-cloud/

5 Steps to Building a Robust Cyber Resilience Framework (Check Point)

Traditional cyber security approaches often focus solely on preventing breaches. In contrast, a resilience framework recognizes that attacks are sometimes inevitable. It builds on preventative measures with a comprehensive focus on incident response and business continuity planning.

https://blog.checkpoint.com/securing-the-cloud/5-steps-to-building-a-robust-cyber-resilience-framework/

Thursday 9/19

Managing ripples and riding waves: Navigating the future of Intelligent Data Infrastructure (NetApp)

The IT environment is much like the ocean, where crests of innovation rise and fall—some as gentle ripples, others as towering waves that reshape the entire landscape. When it comes to making the most of data in the era of intelligence, businesses must learn to ride these waves or risk being swept away. 

https://www.netapp.com/blog/navigating-future-intelligent-data-infrastructure/

CISA and FBI Release Secure by Design Alert on Eliminating Cross-Site Scripting Vulnerabilities

Vulnerabilities like cross-site scripting (XSS) continue to appear in software, enabling threat actors to exploit them. However, cross-site scripting vulnerabilities are preventable and should not be present in software products.

https://www.cisa.gov/news-events/alerts/2024/09/17/cisa-and-fbi-release-secure-design-alert-eliminating-cross-site-scripting-vulnerabilities

Friday 9/20

Cloud Logging Tips and Tricks (Wiz)

Managing cloud logs is essential for cloud security, but understanding the world of logging can be complex. Each cloud provider offers different log categories, each with unique names, formats, and configuration options. Understanding which logs you need to collect and ensuring all necessary logs are enabled can be quite difficult, especially when considering cost.

https://www.wiz.io/blog/cloud-logging-tips-and-tricks

Five Hidden Costs of Cyber Attacks (Arctic Wolf)

The hidden costs of a cyber attack can extend far beyond the initial financial damage. These additional costs can damage an organization’s reputation and operations in ways that can have a much longer tail than the initial costs.

https://arcticwolf.com/resources/blog/hidden-costs-of-cyber-attacks/