If you had a busy week and need to catch up, here’s our recap of tech stories you may have missed the week of 03/28/22!
Webinar – “Who put dust mites on the menu?”: Can Security catch up to digital transformation?
IT Operations
-
Zero trust requires network visibility
-
4 ways the CIO can help stem the Great Resignation
-
Data center infrastructure spending still growing as cloud providers keep buying
Microsoft
-
Microsoft is adding a new driver-blocklist feature to Windows Defender on Windows 10 and 11
-
Microsoft targets multicloud with Arc-enabled Azure Stack HCI
-
Introducing the new Azure Front Door: Reimagined for modern apps and content
-
Azure Cost Management and Billing updates – March 2022
VMware
-
VMware vRealize Operations Management Pack for Horizon 2.0 updates
-
Announcing preview of VMware Cloud Flex Storage
Cisco
-
Securing your cloud-native application with Cisco App-First Security
-
New in SecureX: Device Insights
-
Securing hybrid work in the public sector
AWS
-
Palo Alto launches cloud-native firewall service for AWS
-
Optimizing AWS Lambda function performance for Java
-
AWS Organizations now provides a simple, scalable and more secure way to close your member accounts
-
Snowflake vs AWS Redshift: Data warehousing software comparison
Security
-
Hive ransomware group claims Partnership HealthPlan of California data breach
-
Hackers are getting faster at exploiting zero-day flaws. That's going to be a problem for everyone
-
CISA warns of attacks against internet-connected UPS devices
-
North Korean threat actors target news outlets and fintechs with a Google Chrome vulnerability
-
Attackers compromise 94% of critical assets within four steps of initial breach
-
Sophos patches critical remote code execution vulnerability in Firewall
-
FBI: Ransomware attacks are piling up the pressure on public services
-
Chinese hackers Deep Panda return with Log4Shell exploits, new Fire Chili rootkit
-
'Massive cyberattack' against Ukrainian ISP has been neutralized, Ukraine says
-
Cybercriminals’ phishing kits make credential theft easier than ever
-
“Browser in the Browser” attacks: A devastating new phishing technique arises
-
Google: Multiple hacking groups are using the war in Ukraine as a lure in phishing attempts
-
CISA: Here are 66 more security flaws actively being used by hackers - so get patching