Monday 12/2
Why Data Infrastructure Is the Bedrock of AI’s Success (Pure Storage)
AI can be a resource-intensive and power-hungry endeavor. A high-performance storage platform that offers seamless data accessibility, scalability, and energy and cost efficiency will be essential to meet the demands of AI today and into the future.
https://blog.purestorage.com/perspectives/why-data-infrastructure-is-the-bedrock-of-ais-success/
What is bring your own device (BYOD)? (Nerdio)
As remote and hybrid work become more popular, bring your own device (BYOD) policies are changing how businesses operate. BYOD lets employees use their personal smartphones, laptops, and tablets for work, making it easier for teams to stay connected and productive, no matter where they are. For companies, it’s a smart way to cut hardware costs while giving employees more flexibility and control over their devices.
https://getnerdio.com/resources/what-is-byod/
Tuesday 12/3
Identity Evolved: The Rise of Multi-Factor Verification (HYPR)
Just as MFA arose to fight phishing and password attacks, multi-factor verification has emerged to combat social engineering and other modern identity threats.
https://blog.hypr.com/the-rise-of-multi-factor-verification
How to Protect Your IoT and OT Devices from Cyberthreats (CyberArk)
IoT and OT devices are now essential to sectors like manufacturing, healthcare, energy and transportation. These devices collect enormous amounts of data, control critical processes and often work in environments where downtime isn’t an option. Yet, their rapid proliferation has brought with it significant security concerns.
https://www.cyberark.com/resources/blog/how-to-protect-your-iot-and-ot-devices-from-cyberthreats
Wednesday 12/4
CrowdStrike and Cribl Expand Partnership with CrowdStream for Next-Gen SIEM (CrowdStrike)
While SIEM solutions have existed for decades now, the market has faced recent upheaval with the advent of cloud-native solutions and a surge of mergers and acquisitions in the last year. As the SIEM market undergoes seismic shifts, CrowdStrike and Cribl have joined forces to help SOCs with their modernization journey.
https://www.crowdstrike.com/en-us/blog/cribl-partnership-crowdstream-expansion/
The Rise of MMS Scams: A Picture Is Worth a 1,000 Words—and Sometimes That’s Not Good (Proofpoint)
MMS-based abuse represents a burgeoning attack vector. In the past 18 months, subscriber reports of unwanted MMS messages have grown from far less than 1% of all reports in January 2023 to more than 21% in October of this year. Since January of this year, reports of unwanted MMS messages have grown by a staggering 429%.
https://www.proofpoint.com/us/blog/email-and-cloud-threats/growing-threat-mms-scam-messages
Thursday 12/5
Improved security, admin interfaces, and user experiences across the Citrix solution portfolio (Citrix)
On November 19th, we announced Citrix integration with Windows 365, a new entitlement for Citrix customers, which enables expansion opportunities to Windows 365. As you uncover new use cases for Windows 365 deployment, now you’ll be able to integrate Citrix with an unlimited number of Cloud PCs at no additional cost provided that you already have the requisite eligible licenses from Microsoft.
https://www.citrix.com/blogs/2024/12/04/improved-security-admin-interfaces-and-user-experiences-across-the-citrix-solution-portfolio/
Beyond the Entry Point: Why Lateral Movement is Key in Ransomware Tactics (Bitdefender)
Once inside, attackers don’t rush to their targets. Instead, they navigate laterally across the network, probing for weaknesses, escalating access, and positioning themselves to strike at the heart of your organization. This ability to move unnoticed, like water seeping through cracks, is what transforms a minor breach into a catastrophic ransomware event.
https://www.bitdefender.com/en-us/blog/businessinsights/beyond-the-entry-point-why-lateral-movement-is-key-in-ransomware-tactics
Friday 12/6
Rubrik Expands Key Security Features to Azure Cloud and AWS (Rubrik)
Expanding Rubrik's advanced security features to Microsoft Azure and Amazon Web Services aims to provide a comprehensive solution to address the challenges of cyber threats in cloud environments. These tools are designed to give businesses the confidence to bounce back from attacks, minimizing downtime and financial losses while maintaining business continuity and preserving customer trust.
https://www.rubrik.com/blog/company/24/12/rubrik-expands-key-security-features-to-azure-cloud-and-aws
Minimize enterprise password attacks with the latest security strategies (Delinea)
Anyone with the proper password and user credential can gain unauthorized access to sensitive data, conduct fraudulent transactions, and even bring down systems critical to running your business. If people use the same password to gain access to multiple systems, then a password attack can result in damage not just in one area of the business, but many.
https://delinea.com/blog/enterprise-password-attacks