This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On February 07, 2025

Monday 2/3

6 building blocks of a winning identity security strategy (Delinea)

Identity strategy is not just about ensuring humans and non-humans have the right access; it's also about enhancing the security mechanisms that protect sensitive information from unauthorized access and breaches.

https://delinea.com/blog/6-building-blocks-of-a-winning-identity-security-strategy

Tuesday 2/4

Staying Ahead: Proactive Cybersecurity in the Era of Evolving Threats (Adlumin)

By leveraging advancements in artificial intelligence (AI) and machine learning (ML), preemptive solutions empower organizations to stay ahead of adversaries.

https://adlumin.com/post/staying-ahead-proactive-cybersecurity-in-the-era-of-evolving-threats/

Account Compromise Arms Race: The Rise of Phishing-as-a-Service (Abnormal)

Discover how phishing-as-a-service (PhaaS) is transforming phishing attacks with cloud-based platforms, multi-factor authentication bypass, and session hijacking.

https://abnormalsecurity.com/blog/account-compromise-phishing-as-a-service

Regaining Control of Your Application Email Relaying (Proofpoint)

With applications sending 42% of email, messaging and security teams have their work cut out for them. Historically, on-premises SMTP relays have helped control which application-generated messages were being sent by their organizations’ domains. However, as applications modernize, teams are struggling to maintain this control.

https://www.proofpoint.com/us/blog/regain-control-of-application-email-relaying

Wednesday 2/5

The Evolving Role of AI in Data Protection (CrowdStrike)

While AI is often framed as posing a risk to privacy, it’s important to recognize that AI is critical for protecting data against cyber threats, thereby becoming critical for modern privacy. AI-powered systems can detect and respond to threats faster and more accurately than traditional methods, making them essential in our defense against sophisticated cyberattacks and data breaches.

https://www.crowdstrike.com/en-us/blog/the-evolving-role-of-ai-in-data-protection/

Thursday 2/6

Persistent vs. non-persistent VDI (Nerdio)

When implementing virtual desktop infrastructure (VDI), choosing the right deployment type—persistent or non-persistent—is critical. Each approach has unique benefits, drawbacks, and ideal use cases that align with different business needs. Let’s break down the key differences to help you make an informed decision.

https://getnerdio.com/resources/persistent-vs-non-persistent-vdi/

ZTNA is no longer enough. So, what’s next? (Cato Networks)

Zero Trust Network Access (ZTNA) revolutionized how enterprises secure remote work, but it has its limitations and challenges. Universal Zero Trust Network Access (UZTNA) is the next evolution in zero trust. It secures remote and hybrid work, without boundaries, vulnerabilities, or compromises.

https://www.catonetworks.com/blog/ztna-is-no-longer-enough-so-whats-next/

Friday 2/7

The Aurora Endpoint Security Difference: Ushering in a New Dawn for Cybersecurity (Arctic Wolf)

The addition of the Cylance portfolio and team marks a pivotal moment in Arctic Wolf’s journey to redefine cybersecurity. Cylance’s groundbreaking innovations in AI and machine learning will enhance our already industry-leading security operations platform, enabling us to stay ahead of sophisticated threats and deliver even greater value to our customers by preventing attacks.

https://arcticwolf.com/resources/blog/the-aurora-endpoint-security-difference-ushering-in-a-new-dawn-in-cybersecurity/

4 tips for securing GenAI-assisted development (Snyk)

GenAI doesn’t account for organizational policies and best practices, so it can’t adhere to compliance regulations or organization-specific security guidelines. It’s also possible for team members to unintentionally expose sensitive data by inputting it into LLMs. 

https://snyk.io/blog/4-tips-for-securing-genai-assisted-development/