Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/9 Move to Azure Virtual Desktop—The Right Way (Nerdio) The first rule of AVD migration? Plan ahead. We can’t stress this enough. Rushing into a migration without a solid game plan is a recipe for disaster. https://getnerdio.com/resources/move-to-azure-virtual-desktop-the-right-way/ What Key Cyberthreats Do Small Businesses Face? (Bitdefender) Small businesses owners not only have limited resources to defend against cyberattacks, they also typically lack the time and knowledge to ke... read more.

  • September 13, 2024

By Bert Amodol, Posted in Security

Understanding Infant Digital Privacy: A Growing Concern in the Digital Age In today’s digital world, the concept of privacy has evolved beyond traditional boundaries. One of the most pressing issues emerging from this evolution is a new concept to me, "infant digital privacy." Although infants themselves are not interacting with digital technologies directly, their personal data is increasingly being collected, shared, and sometimes exploited. As parents and caregivers, it’s essential to unders... read more.

  • September 12, 2024

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In the realm of cybersecurity, incidents are inevitable. The key to minimizing their impact lies in having a well-coordinated incident handling process. Central to this process is designating one key person and at least one backup who will manage the enterprise’s incident handling. This ensures that incident response and recovery efforts are coordinated and documented efficiently. Whether you rely on i... read more.

  • September 10, 2024

By Eric Corcoran, Posted in Technology Week in Review

Thursday 8/29 Introducing Automatic URL Categorization: Enhanced Security and Efficiency (Check Point) Our new feature, Automatic URL Categorization, helps your team make the most of their security policies. This capability leverages advanced machine learning and natural language processing (NLP) to provide superior URL classification, ensuring security policies are applied accurately. https://blog.checkpoint.com/security/introducing-automatic-url-categorization-enhanced-security-and-efficiency/ Inciden... read more.

  • September 06, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/19 Unmasking Styx Stealer: How a Hacker’s Slip Led to an Intelligence Treasure Trove and their Big Reveal (Check Point) During the debugging of Styx Stealer, the developer made a fatal error and leaked data from his computer, which allowed CPR to obtain a large amount of intelligence, including the number of clients, profit information, nicknames, phone numbers, and email addresses, as well as similar data about the actor behind the Agent Tesla campaign. https://blog.checkpoint.com/researc... read more.

  • August 23, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/12 Why a Data-resilient Architecture Is Critical for Recovery (Pure Storage) IT teams need to be prepared to recover quickly from an outage event, no matter the cause. See how Pure Storage can help speed your recovery efforts. https://blog.purestorage.com/solutions/why-a-data-resilient-architecture-is-critical-for-recovery/ Announcing the general availability of Citrix DaaS Backup + Restore (Citrix) Backup + Restore is now generally available for all Citrix DaaS customers. This powerful featur... read more.

  • August 16, 2024

By Steve Gold, Posted in Security

In an increasingly interconnected world, enterprises rely on numerous service providers to support their operations, from cloud storage solutions to specialized consulting services. Managing these relationships effectively requires a comprehensive and up-to-date inventory of service providers. This blog explores the importance of establishing and maintaining such an inventory, complete with classifications and designated enterprise contacts, and highlights the necessity of regular reviews and updates. To ma... read more.

  • August 13, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/5 Introducing native Conditional Authentication to Citrix Cloud! (Citrix) Prior to this release, only one type of authentication method was allowed natively. Multiple methods required the use of Adaptive Authentication which relies on NetScaler nFactor, which increases complexity. https://www.citrix.com/blogs/2024/08/02/introducing-native-conditional-authentication-to-citrix-cloud/ Tuesday 8/6 The Perils of Insecure Networks ft. Bryon Singh, RailWorks Corporation https://www.gothamtg.com/blog... read more.

  • August 09, 2024

By Steve Gold, Posted in Security

In our increasingly interconnected world, the importance of secure network practices cannot be overstated. As more enterprises embrace remote work, it is crucial to train workforce members on the dangers of connecting to and transmitting data over insecure networks for enterprise activities. This training should also extend to securely configuring home network infrastructure. To make these concepts engaging and memorable, we will use references from popular culture to illustrate the importance of secure net... read more.

  • August 06, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/29 Protecting Your Cloud Application Against Unknown Risks (Check Point) No system can ever be completely impervious to threats. Even with state-of-the-art protections in place, cloud security is never truly good enough if there remain unidentified vulnerabilities. https://blog.checkpoint.com/securing-the-cloud/protecting-your-cloud-application-against-unknown-risks/ Identity-based attacks and the identity attack chain (Delinea) Identity-based attacks progress in phases along what’s know... read more.

  • August 02, 2024