Monday 5/5
ICYMI: On April 22, 2025, Gotham's CTO, Ken Phelan, was joined by Check Point Software's Head of U.S. East Sales, Mark Ostrowski, to discuss Check Point's latest Threat Report, their cybersecurity innovations involving artificial intelligence, and more.
Click the link below for the full video.
https://www.youtube.com/watch?v=WwTolJAStz4&t
The Expanding Attack Surface: Stopping Account Takeovers at Your Front Door Is Critical (Proofpoint)
Organizations must understand that there are countless ways for attackers to gain access, including methods like multifactor authentication (MFA) bypass that don’t require phishing or direct engagement with a person. But the attack doesn’t stop at the initial compromise—it’s multistage.
https://www.proofpoint.com/us/blog/email-and-cloud-threats/stopping-account-takeovers-requires-defense-in-depth
CrowdStrike Strengthens Data Security Across Endpoint, Cloud, and SaaS Applications (CrowdStrike)
Falcon Data Protection gains new capabilities to protect sensitive data across endpoint and cloud, and SaaS Threat Services identifies and mitigates risk across SaaS environments.
https://www.crowdstrike.com/en-us/blog/crowdstrike-strengthens-data-security-across-endpoint-cloud-saas/
Tuesday 5/6
CIS Safeguard 3.9: Encrypt Data on Removable Media
https://www.gothamtg.com/blog/cis-safeguard-39-encrypt-data-on-removable-media
The desktop has dissolved. Now where does work live in 2025? (Citrix)
Today’s workspace isn’t tied to a specific operating system or machine, rather it’s more abstract, portable, and accessible. The modern workspace is no longer a place where work happens. It’s the control plane for work itself.
https://www.citrix.com/blogs/2025/05/01/the-desktop-has-dissolved-now-where-does-work-live-in-2025/
Top Identity Threats Your Organization Faces (Arctic Wolf)
For many modern and digital-first organizations, identity is quickly turning into a critical part of the attack surface, and recent data highlights the real risks posed to identities and identity systems within IT environments.
https://arcticwolf.com/resources/blog/top-identity-threats-facing-your-organization/
Wednesday 5/7
AI Security Report 2025: Understanding threats and building smarter defenses (Check Point)
The use of AI in cyber crime is no longer theoretical. It’s evolving in parallel with mainstream AI adoption, and in many cases, it’s moving faster than traditional security controls can adapt.
https://blog.checkpoint.com/research/ai-security-report-2025-understanding-threats-and-building-smarter-defenses/
Thursday 5/8
The Cybersecurity Investment Most Organizations Are Failing to Secure (CyberArk)
Attackers aren’t just weaponizing AI to automate phishing, bypass controls and mimic users with growing accuracy—they’re also finding new ways to corrupt AI models into “jailbreaking,” or secretly extracting and sending users’ personal information and payment details.
https://www.cyberark.com/resources/blog/the-cybersecurity-investment-most-organizations-are-failing-to-secure
What Analyzing Hundreds of Thousands of Cloud Environments Taught Us About Data Exposure (Wiz)
Publicly accessible resources are a normal part of cloud operations. But 72% of cloud environments have publicly exposed PaaS databases lacking access controls, raising the risk that sensitive data could be unintentionally exposed.
https://www.wiz.io/blog/cloud-data-security-report-snapshot
Friday 5/9
From Tool Sprawl to Strategic Simplicity: The Case for Platformisation (Abnormal AI)
Tool bloat is an easy win for hackers and a major integration headache for overstretched security teams. Platformisation could be the antidote to cyber complexity, closing the coverage gaps while dramatically easing the management of multiple security tools.
https://abnormal.ai/blog/tool-sprawl-to-strategic-simplicity-case-for-platformisation
Threat Hunting 101: A Beginner’s Guide to Proactive Cyber Defense (Cribl)
Threat hunting isn’t a one time thing, it’s an on-going exercise that you should include in your schedule. It helps improve your defensive posture, understand your environment, and improve incident response strategies.
https://cribl.io/blog/threat-hunting-101-a-beginners-guide-to-proactive-cyber-defense/