This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On June 13, 2025

Monday 6/9

No Excuses: Why Multi-Factor Authentication is Non-Negotiable (Check Point )

If you think your users’ passwords are secret, think again. Credential dumps from breached companies are traded daily on the dark web. Password reuse is rampant. Phishing attacks are more sophisticated than ever, and employees are fallible — always have been, always will be.

https://blog.checkpoint.com/harmony-sase/no-excuses-why-multi-factor-authentication-is-non-negotiable/

Rethinking File Storage: Pure Enterprise File in Action (Pure Storage)

Pure File from Pure Storage simplifies file storage with cloud-like agility, unified management, and real-time adaptability—replacing legacy complexity with modern efficiency.

https://blog.purestorage.com/products/rethinking-file-storage-pure-enterprise-file-in-action/

Tuesday 6/10

GenAI's Impact — Surging Adoption and Rising Risks in 2025 (Palo Alto Networks)

GenAI has shifted from a mere novelty to an essential utility, and its rapid adoption comes with security implications that every CISO, CIO and IT security professional must understand.

https://www.paloaltonetworks.com/blog/2025/06/genais-impact-surging-adoption-rising-risks/

When You Can’t Prevent the Unpreventable, Your Recovery Strategy Must Start Before an Attack (Rubrik)

The fundamental problem with legacy backup and recovery architectures is that they were designed for environmental disasters (fires, floods, hardware failures, etc.), not adversarial attacks. When ransomware encrypts your production systems, you face questions that traditional backup systems simply can't answer quickly.

https://www.rubrik.com/blog/technology/25/6/when-you-cant-prevent-the-unpreventable

Wednesday 6/11

What is Privileged Access Management? (Arctic Wolf)

Similar to other access control measures or strategies, the idea behind PAM is to closely manage privileged access and prevent an identity-based attack from originating within or compromising these accounts.

https://arcticwolf.com/resources/blog/what-is-privileged-access-management/

Thursday 6/12

CrowdStrike and Microsoft Unite to Harmonize Cyber Threat Attribution (CrowdStrike)

Despite cyber threat intelligence tracking a multitude of threat actors for many decades, accurately attributing malicious activity continues to be difficult. Vendors and researchers often see different parts of the same puzzle — or entirely different puzzles — due to differences in telemetry.

https://www.crowdstrike.com/en-us/blog/crowdstrike-and-microsoft-unite-to-deconflict-cyber-threat-attribution/

The future of identity governance: fast, secure, and scalable (CyberArk)

Given the inconsistent oversight across increasingly complex ecosystems, 32% of organizations plan to invest in identity governance and compliance (IGA) this year. Modernizing with a faster, more adaptive IGA solution will be critical for improving overall visibility and making governance easy, intuitive, and all-inclusive.

https://www.cyberark.com/resources/blog/the-future-of-identity-governance-fast-secure-and-scalable

Building a Security Operations Center for the Cloud: Key Considerations for People, Processes, and Technology (Wiz)

As cloud adoption accelerates, security operations teams must rethink their people, processes, and technology to enable effective Cloud Detection and Response (CDR) and secure their evolving cloud attack surface.

https://www.wiz.io/blog/building-soc-for-cloud

Friday 6/13

4 AI use cases in the fight against ransomware (Delinea)

As ransomware attacks become more frequent and sophisticated, leveraging AI in cybersecurity is no longer an option but a competitive advantage. From enhancing the capabilities of SOC teams to automating critical IAM and PAM functions, AI is playing a pivotal role in shaping the future of ransomware defense and proactively mitigating risk.

https://delinea.com/blog/4-ai-use-cases-in-the-fight-against-ransomware

Unravelling Cyber Defense Model Secrets: Password Spray Detections (Adlumin)

When it comes to cybersecurity, some of the oldest tricks are still among the most dangerous. Weak or default passwords continue to be a top target for attackers, and one tactic that’s quietly gaining traction is the password spray attack.

https://adlumin.com/post/unravelling-cyber-defense-model-secrets-password-spray-detections/