This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On May 02, 2025

Monday 4/28

Windows 10 Enterprise End of Life: What you need to know & next steps (Nerdio)

As support ends, the risks stack up quickly. Without regular updates, virtual desktops running Windows 10 will become targets for cyberattacks, particularly in environments where endpoints are exposed to external traffic or house confidential information.

https://getnerdio.com/resources/windows-10-enterprise-end-of-life-what-you-need-to-know-next-steps/

Proofpoint Innovations That Simplify Your Operations (Proofpoint)

As the digital workspace expands, the human-centric challenges faced by CISOs and security organizations are growing exponentially. Attackers exploit multiple platforms, making it harder to investigate threats, identify high-risk users and enforce security controls.

https://www.proofpoint.com/us/blog/email-and-cloud-threats/proofpoint-innovations-simplify-your-operations

Tuesday 4/29

CIS Safeguard 3.8: Document Data Flows

https://www.gothamtg.com/blog/cis-safeguard-38-document-data-flows

Beyond the breach: Storage turns cyberdefense into resilience (NetApp)

Storage isn’t a backroom player—it’s the battlefield. Security obsesses over perimeters and endpoints, but data is the real target; Sophos noted that 94% of 2024 attacks hit backups.

https://www.netapp.com/blog/data-storage-cyber-defense-cyber-resilience/

Engineering the Delinea SaaS platform for near-perfect uptime (Delinea)

For security leaders, high uptime means one less worry: your critical identity security controls remain up even during cyber crises or peak demand, reducing risk windows. IT teams won’t be paged at midnight for system outages, freeing them to focus on strategic projects instead of recovery efforts.

https://delinea.com/blog/delinea-saas-platform-near-perfect-uptime

Wednesday 4/30

Rising Mobile Threats: Closing the Security Gap in Your Organization’s Device Strategy (Check Point)

Today’s adversaries are targeting data wherever it resides. As GenAI adoption accelerates, misconfigured applications and unsecured usage create new vectors for data exposure. Legacy data loss prevention solutions, which often require separate tools for endpoint and cloud environments, aren’t enough to defend against modern attacks.

https://blog.checkpoint.com/securing-user-and-access/rising-mobile-threats-closing-the-security-gap-in-your-organizations-device-strategy/

CrowdStrike Strengthens Data Security Across Endpoint, Cloud, and SaaS Applications (CrowdStrike)

CrowdStrike is closing the gaps adversaries exploit to steal data by protecting sensitive information across modern hybrid environments. Falcon Data Protection now delivers real-time protection for data at rest and in motion, from endpoint to cloud.

https://www.crowdstrike.com/en-us/blog/crowdstrike-strengthens-data-security-across-endpoint-cloud-saas/

Thursday 5/1

The Dangers of Double and Triple Extortion in Ransomware Attacks (Arctic Wolf)

Double extortion first emerged as a trend in 2019, with notable ransomware groups Maze and Revil demanding an additional ransom in exchange for not releasing data they had exfiltrated during ransomware attacks. This trend is now, unfortunately, the norm.

https://arcticwolf.com/resources/blog/dangers-of-double-and-triple-extortion/

What’s new with Citrix: Citrix Virtual Apps and Desktops 2503 is now generally available (Citrix)

With CVAD 2503 officially here, you can immediately take advantage of all of the latest features and enhancements. Check out all the features and capabilities we’ve added to your environment.

https://www.citrix.com/blogs/2025/04/29/whats-new-with-citrix-citrix-virtual-apps-and-desktops-2503-is-now-generally-available/

Friday 5/2

Unraveling Cyber Defense Model Secrets: Lateral Movement (Adlumin)

By leveraging machine learning and advanced log analysis, security teams can uncover the subtle signs of lateral movement — even when attackers try to blend in with normal user activity.

https://adlumin.com/post/unraveling-cyber-defense-model-secrets-lateral-movements/

Strengthening Cloud Email Security: Enhancements to Power Up Your Protection (Abnormal AI)

Email attacks are evolving fast, and so are we. At Abnormal, we’re redefining cloud email security with behavioral AI that is designed to keep your organization protected from threats that other tools miss.

https://abnormal.ai/blog/cloud-email-security-improvements