This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On October 11, 2024

Monday 10/7

What’s New in Citrix Workspace App: Security, Speed, and Experience (Citrix)

The Citrix Workspace app is designed to provide users with a secure, easy-to-install client that delivers instant access to business-critical applications, desktops, and data from any device. As the first touchpoint it’s a key component to ensure secure access to your users and also essential for employee productivity.

https://www.citrix.com/blogs/2024/10/01/whats-new-in-citrix-workspace-app-security-speed-and-experience/

Understanding and Detecting Lateral Movement (Arctic Wolf)

Lateral movement occurs when a threat actor navigates through a breached environment, often gaining new access and user privileges as they go. It is typically a later stage of a breach, occurring after initial access is gained through the root point of compromise, and often after persistence is maintained in the environment, privileges are escalated, and defenses are evaded.

https://arcticwolf.com/resources/blog/understanding-and-detecting-lateral-movement/

Tuesday 10/8

Developing a Workaround for OneDrive AutoSign-in Issues

We recently assisted a client with a Microsoft OneDrive issue where users were not automatically signed into OneDrive through Azure RemoteApp or Azure Virtual Desktop. The client's resources were hosted on Windows 11 version 22H2 running OneDrive 24.166.0818.0003.

https://www.gothamtg.com/blog/workaround-for-onedrive-autosign-in-issue

What Is An SSL Certificate And 6 Reasons Why Your Small Business Website Needs One (Bitdefender)

Without proper security, your site could be vulnerable to cyberattacks, putting both your business and your customers at risk. An SSL certificate not only encrypts this data, keeping it safe from hackers, but also signals to your customers that they can trust your website.

https://www.bitdefender.com/en-us/blog/hotforsecurity/what-is-a-ssl-certificate-and-6-reasons-why-your-small-business-website-needs-one/

Is Endpoint Recovery Part of Your Business Continuity Plan? (IGEL)

Business continuity plans are robust, ensuring that critical information is backed up, replicated, and readily available, even in the face of disaster. But while these plans meticulously cover data, many organizations overlook a crucial aspect of their infrastructure: the endpoint.

https://www.igel.com/blog/is-endpoint-recovery-part-of-your-business-continuity-plan/

Wednesday 10/9

5 Ways to “Secure Our World” for Cyber Security Awareness Month (Check Point)

In an era where our lives are increasingly intertwined with the digital world, the significance of cyber security cannot be overstated. The evolving nature of threats in today’s digital landscape makes them all the more impactful and challenging for organizations to combat.

https://blog.checkpoint.com/security/5-ways-to-secure-our-world-for-cyber-security-awareness-month/

Non Disruptive Upgrades: The Pure Storage Ship of Theseus (Pure Storage)

FlashArray controllers can be upgraded while the array is powered on and actively supporting its upstream workloads. Learn more about non-disruptive upgrades (NDUs) and how they provide technical and financial value.

https://blog.purestorage.com/perspectives/non-disruptive-upgrades-the-pure-storage-ship-of-theseus/

Thursday 10/10

Who’s Responsible for Your Security? (CyberArk)

Collectively, we have all left the job of protection to something or someone else. The digital world we all navigate is filled with digital pitfalls at every turn. Holding to the old castle and moat methodology and “Keeping all the bad guys out” no longer works.

https://www.cyberark.com/resources/blog/whos-responsible-for-your-security

Friday 10/11

Unraveling Cyber Defense Secrets: Strategies for Defending Against Credential Harvesting (Adlumin)

With more logins to manage than ever, it’s easy to see why people reuse passwords or turn to tools like single sign-on (SSO). However, this can create a single point of vulnerability—if one password is compromised, it could grant access to multiple systems.

https://adlumin.com/post/unraveling-cyber-defense-secrets-strategies-for-defending-against-credential-harvesting/

ZTNA Face-Off: Traditional vs. Universal – Unveiling the Key Differences (Cato Networks)

In the ever-evolving cybersecurity landscape, the debate between Universal ZTNA and Traditional ZTNA is heating up. While Traditional ZTNA has been a cornerstone for secure access, Universal ZTNA is redefining the game with its comprehensive, adaptive approach.

https://www.catonetworks.com/blog/ztna-face-off-traditional-vs-universal/