Articles In Technology Week in Review

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/22 Eon Cloud Backup: Transforming Data Protection for Modern Businesses Eon Cloud Backup feels like an SDWAN for Backup. It delivers management and data planes across hyperscalers, abstracting each platform’s functions and capabilities into an easily manageable and highly automated solution. By leveraging underlying infrastructure, Eon creates a system that truly is greater than the sum of its parts. https://www.gothamtg.com/blog/eon-cloud-backup-transforming-data-protection-for-modern-bu... read more.

  • January 09, 2026

By Timothy Karl, Posted in Technology Week in Review

As organizations modernize their end-user computing (EUC) environments, I’ve been helping customers work through Citrix’s evolving licensing options—most often during renewals, cloud planning, or broader modernization discussions. Below is a short summary of what I’ve learned and how I typically explain the differences between the three primary Citrix Cloud licensing options, Citrix Universal, Citrix Private Cloud, and Citrix Platform, to customers. Citrix Universal License Best f... read more.

  • December 19, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/15 Elevating the Microsoft Digital Workplace: Expert Insights on ControlUp’s Role in the AI-Era (ControlUp) Complete visibility into the digital workplace isn’t just helpful with a hybrid workforce, it’s critical. With solutions like Azure Virtual Desktop (AVD), Windows 365 (W365), Intune, and Microsoft Teams forming the backbone of many modern enterprises, the challenge goes beyond simply running these technologies to really ensuring they deliver a sea... read more.

  • December 19, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/8 Identity Recovery Must Live Outside the Blast Radius of a Cyber Attack (Rubrik) As hybrid identity becomes the backbone of cloud and SaaS access, we can't afford recovery strategies that assume the control plane will stay safe. We have to assume breach. https://www.rubrik.com/blog/technology/25/12/identity-recovery-must-live-outside-the-blast-radius-of-a-cyber-attack Cyber resilience: The name of the game for 2026 (Delinea) With AI now making cybercrime easier by helping even inexperie... read more.

  • December 12, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/10 The Bad Guys’ New Weapon: Ransomware 3.0 (Pure Storage) Ransomware 3.0 is a new type of cyberattack where cybercriminals use AI to plan and stage ransom actions. In this next stage of ransomware, bad actors also leverage multiple forms of extortion, called triple extortion, to up the ante against victims.  https://blog.purestorage.com/perspectives/cyber-resilience-bad-guys-new-weapon-ransomware-3-0/ Automating compliance: Why identity security needs a data-driven tune-up (CyberAr... read more.

  • December 05, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/3 When Data Storage Learns: How Telemetry Transforms Storage Management (Pure Storage) Pure1 AIOps leverages telemetry data from thousands of Pure Storage systems to proactively identify issues, optimize performance, and guide strategic decisions, ensuring your storage keeps getting smarter and better. https://blog.purestorage.com/perspectives/data-storage-telemetry-storage-management/ Tuesday 11/4 Redefining secure access: Advancing Zero Trust at the browser (Citrix) As work moves further i... read more.

  • November 07, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/27 Proofpoint releases innovative detections for threat hunting: PDF Object Hashing (Proofpoint) Due to the complex nature of the PDF format and the many ways threat actors use it to their advantage, detecting malicious PDF files can range from straightforward to nearly impossible. Proofpoint researchers have identified notable campaigns leveraging PDFs and have created a new tool called PDF Object Hashing designed to track and detect the unique characteristics of PDFs used by threat actors. ht... read more.

  • October 31, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/20 Microsoft Dominates Phishing Impersonations in Q3 2025 (Check Point) According to Check Point Research’s Brand Phishing Report for Q3 2025, Microsoft accounted for 40% of all brand impersonation attempts this quarter, holding its place as the most targeted company worldwide. The dominance of major tech players in phishing campaigns shows no sign of slowing. https://blog.checkpoint.com/research/microsoft-dominates-phishing-impersonations-in-q3-2025/ AI, Quantum Computing and Other Emer... read more.

  • October 24, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/13 Pure Storage Unveils High-density QLC Flash Advancements (Pure Storage) A new software-defined architecture from Pure Storage leverages high-density QLC flash and host-based flash management to cost-effectively deliver industry-leading performance density, power, and space efficiency for AI and other hyperscale workloads. https://blog.purestorage.com/news-events/pure-storage-unveils-high-density-qlc-flash-advancements/ Understanding Indicators of Compromise and Their Role in Cybersecurity (... read more.

  • October 17, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/6 The invisible threat: Machine identity sprawl and expired certificates (CyberArk) Without central visibility, security teams inherit overlapping responsibilities and no clear ownership, allowing keys and secrets to remain unrotated or misconfigured and certificates to expire silently. That is, until they break something critical. https://www.cyberark.com/resources/blog/the-invisible-threat-machine-identity-sprawl-and-expired-certificates Tuesday 10/7 5 Essential Cyber Security Tips for Cybe... read more.

  • October 10, 2025