Monday 3/31
What is a Data Poisoning Attack? (Snyk)
Data poisoning is a sophisticated adversarial attack designed to manipulate the information used in training artificial intelligence (AI) models. By injecting deceptive or corrupt data, attackers can hurt model performance, introduce biases, or even create security vulnerabilities.
https://snyk.io/blog/what-is-a-data-poisoning-attack/
Microsoft to Start Enforcing New Outbound Email Limits (Proofpoint)
Microsoft has consistently made it clear that Outlook 365 / Online Exchange is not intended for sending bulk email to recipients who are external to an organization. Soon, they will start restricting these emails to stop abuse.
https://www.proofpoint.com/us/blog/email-and-cloud-threats/microsoft-start-enforcing-outbound-email-limits
Tuesday 4/1
7 Email Security Metrics That Matter: How to Measure and Improve Your Protection (Abnormal Security)
Despite the evolution of security tools and protocols, email continues to be the primary entry point for cyberattacks. Today’s threats go far beyond spam and malware—they’re socially-engineered, highly targeted, and designed to bypass traditional defenses.
https://abnormalsecurity.com/blog/email-security-metrics-that-matter
Backup Data Resiliency: Backups Alone Aren’t Enough (Check Point)
While backups aren’t new, their importance has only grown in today’s digitally dependent world. As we highlighted previously, cyber attacks are escalating—and no one is immune.
https://blog.checkpoint.com/innovation/backup-data-resiliency-backups-alone-arent-enough/
Wednesday 4/2
How to Navigate the 2025 Identity Threat Landscape (CrowdStrike)
As exposed credentials and password spraying define the identity threat landscape, CrowdStrike Falcon Identity Protection helps organizations fight these modern threats.
https://www.crowdstrike.com/en-us/blog/how-to-navigate-2025-identity-threat-landscape/
Is Your Browser Ground Zero for Cyberattacks? (Palo Alto Networks)
In the brave new world of AI and the cloud, organizations must protect this final frontier with security that extends seamlessly to every device, enabling both companies and end-users to operate with agility.
https://www.paloaltonetworks.com/blog/2025/03/is-your-browser-ground-zero-for-cyberattacks/
Thursday 4/3
Staying ahead of AI-powered threats: Insights from Delinea Labs' inaugural cybersecurity report (Delinea)
One of the key findings of the report was that attacks exploiting NHIs —such as service accounts, APIs, and machine identities—have risen significantly due to weak credential management and misconfigured access controls, providing attackers with new infiltration paths.
https://delinea.com/blog/staying-ahead-of-ai-powered-threats-cybersecurity-report
Top Passwordless Identity Assurance Trends for 2025 (HYPR)
Fraud and exploitation are too pervasive to justify the use of knowledge-based factors. This creates an urgent need for organizations to abandon passwords, solidifying security and relieving burdens associated with password maintenance (including credential resets).
https://blog.hypr.com/2025-state-of-passwordless-identity-assurance-report-recap
Friday 4/4
The Overlooked Bottleneck in Data Visibility—and Its Impact on Cyber Resilience (Pure Storage)
Every second counts in cybersecurity. Without high-performance storage to deliver fast ingestion and processing speeds, even the best security tools—and the cyber threat hunting teams using them—will be limited.
https://blog.purestorage.com/perspectives/the-overlooked-bottleneck-in-data-visibility-and-its-impact-on-cyber-resilience/
Citrix’s approach to Secure by Design (Citrix)
All seven Secure by Design goals are important security elements for enhancing the overall product security posture and practices for enterprises. For Citrix, this commitment builds upon our established practices and aligns seamlessly with our vision of delivering secure, scalable, and user-centric enterprise products.
https://www.citrix.com/blogs/2025/04/02/citrixs-approach-to-secure-by-design/