This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On October 25, 2024

Monday 10/21

Unraveling Cyber Defense Secrets: Strategies for Defending Against Credential Harvesting (Adlumin)

With more logins to manage than ever, it’s easy to see why people reuse passwords or turn to tools like single sign-on (SSO). However, this can create a single point of vulnerability—if one password is compromised, it could grant access to multiple systems.

https://adlumin.com/post/unraveling-cyber-defense-secrets-strategies-for-defending-against-credential-harvesting/

Cloud Logging Tip & Tricks: Getting the most value out of your cloud logs (Wiz)

In the cloud, logs are often the only way to get real-time visibility into what's happening, making them critical to any cloud detection and response program.

https://www.wiz.io/blog/cloud-logging-tip-tricks-getting-the-most-value-out-of-your-cloud-logs

Tuesday 10/22

Microsoft Patch Tuesday – October 2024: Critical and Exploited Vulnerabilities (Arctic Wolf)

On October 7, 2024, Microsoft released its October security update, addressing 117 vulnerabilities. Arctic Wolf has highlighted four of these vulnerabilities, which were either classified by Microsoft as critical or reported to have been exploited in the wild. 

https://arcticwolf.com/resources/blog/microsoft-patch-tuesday-october-2024/

Check Point Research Unveils Q3 2024 Brand Phishing Trends: Microsoft Remains Most Imitated Brand as Alibaba and Adobe Enter Top 10 (Check Point)

The consistent prevalence of phishing attacks demonstrates the need for heightened awareness and security measures. Users must remain vigilant by verifying email sources, avoiding suspicious links, and utilizing multi-factor authentication (MFA) to protect their personal and financial information from cyber threats.

https://blog.checkpoint.com/research/check-point-research-unveils-q3-2024-brand-phishing-trends-microsoft-remains-most-imitated-brand-as-alibaba-and-adobe-enter-top-10/

Wednesday 10/23

A Guide to Microsoft Azure Virtual Desktop Cost Management (Nerdio)

AVD is crucial for supporting remote work and digital transformation, but managing these deployments is getting tougher. Relying on manual monitoring or native Azure tools just doesn’t cut it anymore. Without a strategic approach, from understanding cost structures to leveraging automation and strategic forecasting, you’re likely to overspend and underutilize your investment. 

https://getnerdio.com/resources/a-guide-to-microsoft-azure-virtual-desktop-cost-management/

Radically Simplifying Cybersecurity (Palo Alto Networks)

Leveraging advanced technology in today's cyberthreat landscape is no longer optional — it's imperative. At Palo Alto Networks, we've pioneered the integration of AI-driven solutions specifically designed to empower security teams and enhance operational efficiencies.

https://www.paloaltonetworks.com/blog/2024/10/ai-copilot-simplified-security/

Thursday 10/24

How to Protect Your IoT and OT Devices from Cyberthreats (CyberArk)

IoT and OT devices are now essential to sectors like manufacturing, healthcare, energy and transportation. Yet, their rapid proliferation has brought with it significant security concerns. Many of these devices were not designed with comprehensive security in mind, making them prime targets for cyberattacks.

https://www.cyberark.com/resources/blog/how-to-protect-your-iot-and-ot-devices-from-cyberthreats

Friday 10/25

ICYMI: Gotham's CTO, Ken Phelan, was joined by CrowdStrike 's CTO, Elia Zaitsev, to discuss the value of artificial intelligence in cybersecurity, the current state, the net effects, and the future.

Click the link below for the full video.

https://www.youtube.com/watch?v=UXVcUV-aZc0

Ransomware review: October 2024 (ThreatDown)

In September, we recorded a total of 370 ransomware victims, the third lowest all year. The biggest news of the month included ransomware gangs using new tools for data theft, the rise of “hybrid cloud” ransomware, and a 63% increase in attacks by ‘dark horse’ ransomware year-over-year.

https://www.threatdown.com/blog/ransomware-review-october-2024/