Articles In Technology Week in Review

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 9/4 What Is a Hybrid Mesh Firewall and Why It Matters (Palo Alto Networks) A hardware-only approach leaves gaps at the edge, while cloud-only firewalls can’t provide consistent protection across on-premises infrastructure. The result is operational complexity with blind spots and an expanding attack surface. https://www.paloaltonetworks.com/blog/2025/08/hybrid-mesh-firewall-and-why-it-matters/ Cybersecurity Stop of the Month: BEC Attacks Targeting Government Agencies (Proofpoint) What mak... read more.

  • September 05, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/25 The Value of IR Planning and Incident Readiness (Arctic Wolf) Whether dealing with ransomware, business email compromise (BEC), or other cyber threats, IR planning is vital to a strong IR process, as it can shorten response and remediation time, help identify and prepare key stakeholders, streamline when and how to initiate complex processes like digital forensics, and support business continuity and executive management. https://arcticwolf.com/resources/blog/the-value-of-ir-planning-and-inci... read more.

  • August 29, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/18 Speed kills: AI coding tools revive old-school hacks (ReversingLabs) The adoption of AI coding tools has exploded in recent years with their promise of speeding development and automating time-consuming manual tasks such as code audits. But the tools bypass a wide range of accepted security standards — and introduce serious risks for development teams, the researchers warned.  https://www.reversinglabs.com/blog/ai-coding-tools-old-school-hacks DataOps: Optimizing the Data Experien... read more.

  • August 22, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/11 From Cloud to Hybrid: 360° Runtime Protection, Anywhere You Run (Wiz) Securing hybrid infrastructure requires more than just extending existing tools. It demands a new approach that connects workload insights with broader infrastructure context, all in real-time. https://www.wiz.io/blog/from-cloud-to-hybrid-360deg-runtime-protection-anywhere-you-run How to Prevent Helpdesk Social Engineering Attacks (HYPR) Helpdesks are critical support hubs, but their central role makes them prime targ... read more.

  • August 15, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/4 How to mitigate AI-powered social engineering attacks (Delinea) AI can convincingly simulate identities across multiple channels and formats, making AI-powered social engineering attacks more convincing and likely to fool even the savviest, most security-conscious employees. Additionally, AI can execute attacks at scale, learn from its successes, and continually become smarter and stealthier. https://delinea.com/blog/how-to-mitigate-ai-powered-social-engineering-attacks Exploiting Direct Send... read more.

  • August 08, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/28 Redefining DNS Protection (Palo Alto Networks) Advanced DNS Resolver (ADNSR) is purpose-built for this modern reality, delivering intelligent threat prevention with effortless deployment. As a cloud-delivered DNS resolution service, complete with 99.999% availability, ADNSR makes it easy to protect your entire organization, regardless of where your users or infrastructure reside. https://www.paloaltonetworks.com/blog/2025/07/redefining-dns-protection/ How the Enterprise Browser Neutralizes t... read more.

  • August 01, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/14 XenServer: Powering your present, readying your future, and now available for all workloads (Citrix) XenServer is widening its support statement to embrace all types of workloads. This isn’t just a minor update; it’s a strategic move to address the very real challenges facing our customers today, offering a powerful, cost-effective, and versatile hypervisor for your entire virtualized infrastructure. https://www.citrix.com/blogs/2025/07/09/xenserver-now-available-for-all-workloads... read more.

  • July 25, 2025

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 7/1 10 Questions to Evaluate Cloud Email Security Solutions (Abnormal AI) Today’s threats to cloud email use AI to impersonate trusted contacts, mimic real workflows, and blend seamlessly into day-to-day communication. To stop these attacks, security teams require solutions that use AI the way attackers do—strategically, contextually, and at scale. https://abnormal.ai/blog/10-questions-to-evaluate-cloud-email-security The Enterprise’s New Cloud: Where Data Went Wrong and How St... read more.

  • July 11, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/23 Are You Using Everything in Your Citrix Cloud Subscription? Features like Citrix Enterprise Browser, Remote Browser Isolation (RBI), and Secure Private Access (SPA) are included in many Advanced Plus and Premium subscriptions, but often go unused. https://www.gothamtg.com/blog/are-you-using-everything-in-your-citrix-cloud-subscription Cloud Attacks Retrospective: Evolving Tactics, Familiar Entry Points (Wiz) Cloud environments are growing more complex—but attackers aren’t necess... read more.

  • June 27, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/16 AI Is Everywhere—But Security Teams Are Still Catching Up (Wiz) AI is no longer experimental—it’s embedded. According to a recent survey of 96 organizations conducted by Wiz and Gatepoint Research, 87% of respondents’ teams are already using AI services, often through platforms like OpenAI or Amazon Bedrock. But as AI adoption surges, security isn’t keeping pace. https://www.wiz.io/blog/ai-security-readiness-report Optimizing Workloads in a Multicloud World (Nut... read more.

  • June 20, 2025