Monday 11/4
How to Enroll an iOS 18 Device in Intune
Older versions of iOS continue to support the older enrollment method and the device can be successfully upgraded to iOS 18. However, if the user unenrolls the device, re-enrollment will need to be done with the newer enrollment method.
https://www.gothamtg.com/blog/ios-18-mobile-device-management-enrollment
Why SIEM Is Not Right for SaaS Security (Arctic Wolf)
Automating data collection, aggregation, and analysis from all the security tools sounds like every analyst’s dream. But because SIEM is open by design, having to take on the burden of configuring and maintaining every aspect of the tool internally can be a resource drain, leading to misconfigurations, alert fatigue, and other issues that can hinder security more than bolster it.
https://arcticwolf.com/resources/blog/securing-the-cloud-why-siem-is-not-right-for-saas-security/
Ransomware’s Evolving Threat: The Rise of RansomHub, Decline of Lockbit, and the New Era of Data Extortion (Check Point)
Ransomware remains the most pervasive cyber threat, with financially motivated criminal groups deploying increasingly sophisticated tactics, including Ransomware-as-a-Service (RaaS) models and double extortion. This report, based on Check Point Research’s (CPR) September 2024 analysis, provides an in-depth review of the current ransomware trends, key actors, and their impact on sectors such as industrial manufacturing, education, and healthcare.
https://blog.checkpoint.com/research/ransomwares-evolving-threat-the-rise-of-ransomhub-decline-of-lockbit-and-the-new-era-of-data-extortion/
Tuesday 11/5
Rubrik and Microsoft 365 Backup Storage: Seamlessly Recover Your M365 Data and Entra ID at Scale (Rubrik)
Rubrik and Microsoft have partnered to deliver an integrated solution through Microsoft 365 Backup Storage APIs. This means joint Rubrik and Microsoft customers can use the Rubrik integration with Microsoft’sM365 Backup Storage solution within Rubrik Security Cloud.
https://www.rubrik.com/blog/technology/24/11/rubrik-and-microsoft-365-backup-storage-seamlessly-recover-your-m365-data-and-entra-id-at-scale
Protect Your Weakest Link: New Account Linking Capabilities Use AI to Thwart Identity-Based Attacks (CrowdStrike)
Organizations manage thousands, or hundreds of thousands, of enterprise identities as it’s not uncommon for individual users to have multiple enterprise accounts to their name. These accounts can possess different levels of privileged access, often by design, and may even be accessed by their users from the same device. Adversaries know this and can use it to their advantage, targeting lower-privileged accounts to springboard to higher-privileged accounts.
https://www.crowdstrike.com/en-us/blog/new-account-linking-capabilities-crowdstrike-falcon-identity-protection/
Wednesday 11/6
Top Three Ways Organizations Were Unprepared for Cyberattacks in 2023 (Palo Alto Networks)
With attackers moving at greater speed and scale than ever before, the fundamentals of cybersecurity have become even more important. Unit 42 has gathered data from hundreds of incidents across the globe to identify the soft spots in security postures that made cyberattacks in 2023 more risky and painful than they needed to be.
https://www.paloaltonetworks.com/blog/2024/11/top-three-ways-organizations-were-unprepared-for-cyberattacks-in-2023/
The true cost of managing Azure Virtual Desktop in-house (Nerdio)
Managing Microsoft Azure Virtual Desktop (AVD) environments can seem simple at first, but unexpected costs can add up quickly. What could be driving your expenses? Common challenges include allocating more resources than necessary, handling tasks manually, and scaling in ways that aren’t as efficient as they could be. These factors often lead to unnecessary spending, missed automation opportunities, and a significant time investment in daily management.
https://getnerdio.com/resources/the-true-cost-of-managing-azure-virtual-desktop-in-house/
Thursday 11/7
Data access governance: Who's got the keys to your data kingdom? (Wiz)
Each cloud includes roles, groups, users, access keys, and resource-based policies that interact in complex ways, and permissions are often layered and inherited, meaning that access rights can be granted at different levels, such as organization, project, folder, or individual resource. Based on Microsoft’s 2023 State of Cloud Permissions, there are over 40,000 permissions that can be granted across key cloud infrastructure platforms.
https://www.wiz.io/blog/data-access-governance-with-wiz-dspm-ciem
How a Data Platform Can Unlock Silos to Accelerate AI Pipelines (Pure Storage)
Focus on solutions that unify complex infrastructures to support the demands of modern AI workloads—and scale as AI evolves.
https://blog.purestorage.com/perspectives/how-a-data-platform-can-unlock-silos-to-accelerate-ai-pipelines/
Friday 11/8
What’s the difference between authentication and authorization? (Delinea)
When you bring authorization and authentication together you can realize the benefits of defense-in-depth to provide stronger identity security for your organization. The key is ensuring your authorization and authentication solutions are fully integrated and interoperable, so they share information back and forth and are always up to date.
https://delinea.com/blog/authentication-vs-authorization
5 Approaches to Counter a Cybercriminal’s Growing Arsenal (Bitdefender)
From phishing toolkits to fileless attacks, malicious actors today have access to a vast arsenal, each weapon designed to bypass traditional defenses in its own way. Understanding these tools and tactics is the first step toward mounting an effective response.
https://www.bitdefender.com/en-us/blog/businessinsights/5-approaches-to-counter-a-cybercriminals-growing-arsenal/