This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On January 24, 2025

Monday 1/20

CIS Safeguard 2.5: Allowlist Authorized Software

https://www.gothamtg.com/blog/cis-safeguard-25-allowlist-authorized-software

Balancing the cost and complexity of investing in your identity security strategy (Delinea)

For organizations of all sizes, investing in a robust identity security strategy is crucial. The move towards platformization and smart consolidation offers a streamlined path forward, enabling businesses to manage complexities more effectively while aligning with enterprise priorities.

https://delinea.com/blog/investing-in-your-identity-security-strategy

Tuesday 1/21

Securing the Backbone of Enterprise GenAI (CyberArk)

With this drive for rapid innovation comes increased risks, as the pressure to build quickly often leads to cutting corners around security. Additionally, adversaries are now using GenAI to scale their malicious activities, making attacks more prevalent and potentially more damaging than ever before.

https://www.cyberark.com/resources/blog/securing-the-backbone-of-enterprise-genai

Tracking cloud-fluent threat actors - Part two: Behavioral cloud IOCs (Wiz

Implementing behavioral indicators of compromise effectively within detection pipelines requires a combination of technical and procedural strategies. Here are some actionable steps organizations can take in order to do so.

https://www.wiz.io/blog/detecting-behavioral-cloud-indicators-of-compromise-iocs

Wednesday 1/22

Exploring Q4 2024 Brand Phishing Trends: Microsoft Remains the Top Target as LinkedIn Makes a Comeback (Check Point)

Microsoft retained its dominance as the most imitated brand in phishing schemes, accounting for a staggering 32% of all attempts. Apple followed with 12%, while Google ranked third. Notably, LinkedIn reentered the list at fourth place, emphasizing the persistent targeting of technology and Social Network brands.

https://blog.checkpoint.com/research/exploring-q4-2024-brand-phishing-trends-microsoft-remains-the-top-target-as-linkedin-makes-a-comeback/

Introducing Session Remote Start: Faster logins, more productivity (Citrix)

Session Remote Start revolutionizes virtual session logons by addressing one of the most persistent challenges businesses face. With this solution, employees gain near-instant access to their sessions, significantly enhancing their overall experience.

https://www.citrix.com/blogs/2025/01/21/introducing-session-remote-start-faster-logins-more-productivity/

Thursday 1/23

Introducing Enhanced Backup and Restore Features in Citrix Cloud DaaS

Citrix Cloud DaaS has introduced significant upgrades to its backup and restore capabilities, ensuring that businesses can maintain continuity and resilience effortlessly. Here’s a look at what’s new and how these features can benefit your organization.

https://www.gothamtg.com/blog/introducing-enhanced-backup-and-restore-features-in-citrix-cloud-daas

DSPM and The AI Shared Responsibility Model (Rubrik)

As the data owner, how do you uphold your role in the shared responsibility model in each of these layers? Fortunately, data security posture management (DSPM) technology can help data owners manage their part of the AI shared responsibility model to protect critical enterprise data no matter which layer of the stack it interacts with.

https://www.rubrik.com/blog/technology/25/1/dspm-and-the-ai-shared-responsibility-model

Friday 1/24

The Importance of Identity and Access Management (Arctic Wolf)

Identities are an increasingly critical part of organizations as they undergo digital transformation, embrace hybrid work models, and rely more heavily on the cloud and web-based applications. Because of this, identity security has become a critical component of an organization’s security architecture and attack surface management.

https://arcticwolf.com/resources/blog/importance-identity-and-access-management/

The Critical Evolution of Cloud Detection and Response (CrowdStrike)

Organizations must rethink their approach to cloud security as attacks targeting cloud environments grow more sophisticated and harder to detect.

https://www.crowdstrike.com/en-us/blog/critical-evolution-of-cdr/