This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On November 01, 2024

Monday 10/28

Reflecting on 15 Years of Pure Storage (Pure Storage)

October 2024 marks the 15th anniversary of Pure Storage. From the start, we’ve been in it for the long haul to disrupt the enterprise storage industry. We continue to deliver innovation that will help eliminate complexity and make our customers’ lives easier.

https://blog.purestorage.com/news-events/reflecting-on-15-years-of-pure-storage/

A Closer Look at Q3 2024: 75% Surge in Cyber Attacks Worldwide (Check Point)

In Q3 2024, an average of 1,876 cyber attacks per organization was recorded, marking a 75% increase compared to the same period in 2023 and a 15% rise from the previous quarter.

https://blog.checkpoint.com/research/a-closer-look-at-q3-2024-75-surge-in-cyber-attacks-worldwide/

Tuesday 10/29

Understanding Human Risk in Cybersecurity (Arctic Wolf)

So, what is there to do to mitigate human risk? The answer is to build a culture on a foundation of trust. Security awareness programming cannot be treated as a ‘gotcha’ exercise wherein employees are penalized for failing a test.

https://arcticwolf.com/resources/blog/understanding-human-risk-in-cybersecurity/

Exchange Server 2016 and 2019 have less than a year to live (ThreatDown)

End of support for Exchange Server 2016 and 2019 which will be reached on October 14, 2025. According to Microsoft’s official definition, “end of support” refers to the end of the Extended Support phase for products governed by the Fixed Policy.

https://www.threatdown.com/blog/exchange-server-2016-and-2019-have-less-than-a-year-to-live/

Wednesday 10/30

Join us on Thursday, November 7, at 9:30 AM for our next CTO Tech Talk. Gotham's CTO, Ken Phelan, will be joined by ReversingLabs' Chief Trust Officer, Saša Zdjelar, to discuss software supply chain security. See the link below for registration details.

https://www.eventbrite.com/e/cto-tech-talk-tickets-1064714613069?aff=oddtdtcreator

Top FAQs about CrowdStrike Falcon Next-Gen SIEM (CrowdStrike)

CrowdStrike Falcon Next-Gen SIEM addresses the security needs of modern organizations by offering data ingestion, retention, and automated detection and response. As more customers adopt Falcon Next-Gen SIEM, these frequently asked questions help clarify its capabilities, integrations and licensing options.

https://www.crowdstrike.com/en-us/blog/falcon-next-gen-siem-top-faqs/

macOS NotLockBit | Evolving Ransomware Samples Suggest a Threat Actor Sharpening Its Tools (SentinelOne)

Until now, ransomware threats for Mac computers had been at best ‘proof of concept’ and at worst entirely incapable of succeeding at their apparent aim. Interestingly, despite one of the more credible previous attempts being from LockBit itself, this latest discovery appears to be an entirely different threat actor appropriating the name of a more notorious one.

https://www.sentinelone.com/blog/macos-notlockbit-evolving-ransomware-samples-suggest-a-threat-actor-sharpening-its-tools/

Friday 11/1

Cloud accounts are the overlooked privileged identity (Delinea)

Cybercriminals are modifying their strategies by deprioritizing email as a preferred attack vector (down from 52% to 37% YoY) and shifting to a variety of methods to target cloud accounts (44%) and compromising applications (39%), according to our most recent Ransomware Research Report.

https://delinea.com/blog/cloud-accounts-are-the-overlooked-privileged-identity

AI in Cybersecurity: Can Automation Alone Secure Your Organization? (Bitdefender)

As artificial intelligence (AI) continues to evolve and organizations grow more dependent on automation, cybersecurity professionals are going to have to make sure they don’t grow too dependent on the technology. Having a human in the loop ensures that AI is behaving in expected ways to prevent malicious actors from penetrating critical business systems without introducing additional risk to the organization.

https://www.bitdefender.com/en-us/blog/businessinsights/ai-in-cybersecurity-can-automation-alone-secure-your-organization/