This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On September 27, 2024

Monday 9/23

Understanding the Roles in the Ransomware-as-a-Service Ecosystem: Who’s Targeting Your Data Security Gaps (Bitdefender)

Ransomware criminal organizations are now working like streamlined software companies and service providers, with several key roles facilitating this efficient operation.

https://www.bitdefender.com/blog/businessinsights/understanding-the-roles-in-the-ransomware-as-a-service-ecosystem-whos-targeting-your-data-security-gaps/

New Phishing Campaign Exploiting Google App Scripts: What Organizations Need to Know (Check Point)

Check Point Harmony Email Researchers have recently identified a concerning phishing campaign that spoofs Google Apps Script macros – a tool used to automate tasks in Google applications.

https://blog.checkpoint.com/harmony-email/new-phishing-campaign-exploiting-google-app-scripts-what-organizations-need-to-know/

Tuesday 9/24

Citrix Gateway service for StoreFront: A Turnkey HDX Proxy Solution (Citrix)

Citrix Gateway service for StoreFront is a turnkey HDX proxy solution designed specifically for DaaS customers. This innovative service allows customers to maintain their existing NetScaler and StoreFront customizations, minimize maintenance overheads, and leverage the benefits of Citrix Gateway service.

https://www.citrix.com/blogs/2024/09/19/citrix-gateway-service-for-storefront-a-turnkey-hdx-proxy-solution/

Creating an Effective Process for Reporting Security Incidents

https://www.gothamtg.com/blog/creating-an-effective-process-for-reporting-security-incidents

The Hidden AI Risk Lurking In Your Business (Palo Alto Networks)

Third-party GenAI apps have not been vetted or approved for use at work, which exposes companies to serious risks. There’s a reason IT and InfoSec teams vet and approve third-party applications being used within their company’s ecosystem of technologies – they need to understand what apps are being used, whether they are safe, and what sensitive company data, if any, is making its way into these applications.

https://www.paloaltonetworks.com/blog/2024/09/the-hidden-ai-risk-lurking-in-your-business/

Wednesday 9/25

The Digital Workplace is Broken. Here’s How to Fix It. (ControlUp)

A strong digital workplace—and a strong Digital Employee Experience—doesn’t rely on point solutions. Instead, it’s built on a comprehensive platform that covers key elements of digital work like device monitoring, issue analytics, and even automated remediation.

https://www.controlup.com/resources/blog/the-digital-workplace-is-broken-heres-how-to-fix-it/

DORA Compliance: A Security Wake-Up Call (CyberArk)

For IT security leaders, DORA is an opportunity to reassess and refine their access control strategies. It’s not about doing the bare minimum to avoid penalties – it’s about building a resilient security posture that can withstand today’s sophisticated threats.

https://www.cyberark.com/resources/blog/dora-compliance-a-security-wake-up-call

Thursday 9/26

The Continuing Risk of Remote Code Execution (Arctic Wolf)

According to Arctic Wolf Labs, nine of the top 10 vulnerabilities of 2023 were RCEs. These nine vulnerabilities were found in 42% of all engagements with Arctic Wolf Incident Response and, with the continued adoption of the cloud and the ubiquity of hybrid work models, we only expect these types of vulnerabilities to grow in number and severity.

https://arcticwolf.com/resources/blog/the-continuing-rise-of-remote-code-execution/

Introducing Hybrid File Integrity Monitoring (Wiz)

Enhance your security with Wiz’s new hybrid File Integrity Monitoring (FIM) solution, combining agentless and runtime capabilities for comprehensive file monitoring.

https://www.wiz.io/blog/a-hybrid-approach-to-file-integrity-monitoring-agentless-and-runtime-fim

Friday 9/27

5 Benefits of Cloud Computing (Nerdio)

Cloud computing has revolutionized traditional IT setups with flexible, cost-effective solutions that allow businesses to access data and applications from anywhere while only paying for what they use. With diverse deployment models—private, public, and hybrid—cloud technology can be tailored to meet your specific needs.

https://getnerdio.com/resources/5-benefits-of-cloud-computing/

Rubrik and Pure Storage Join Forces to Deliver Complete Cyber Resilience of Mission-Critical Data (Rubrik)

Our partnership combines Rubrik Security Cloud with Pure Storage's FlashArray and FlashBlade technologies, delivering a robust cyber resilience architecture that enables customers to meet the updated 3-2-1-1-0 rules for data protection.

https://www.rubrik.com/blog/technology/24/9/rubrik-and-pure-storage-join-forces-to-deliver-complete-cyber-resilience-of-mission-critical-data