Monday 6/16
AI Is Everywhere—But Security Teams Are Still Catching Up (Wiz)
AI is no longer experimental—it’s embedded. According to a recent survey of 96 organizations conducted by Wiz and Gatepoint Research, 87% of respondents’ teams are already using AI services, often through platforms like OpenAI or Amazon Bedrock. But as AI adoption surges, security isn’t keeping pace.
https://www.wiz.io/blog/ai-security-readiness-report
Optimizing Workloads in a Multicloud World (Nutanix)
Bringing on-premises, co-location and one-to-many public cloud environments to a true multicloud environment enables you to reduce redundant management tools and processes that were previously needed to operate siloed cloud environments. This helps streamline operations, reduce complexity and efficiently resolve issues.
https://www.nutanix.com/blog/optimizing-workloads-in-a-multicloud-world
Tuesday 6/17
CIS Safeguard 3.12: Segment Data Processing and Storage Based on Sensitivity
https://www.gothamtg.com/blog/cis-safeguard-312-segment-data-processing-and-storage-based-on-sensitivity
Wednesday 6/18
Why Prioritization Is Still the Weak Link in Vulnerability Management (Seemplicity)
Difficulty prioritizing vulnerabilities ranks as the third biggest challenge security teams face when managing vulnerabilities. That’s not just an operational inconvenience, it’s a signal that something core to the remediation process is broken.
https://seemplicity.io/blog/prioritization-weak-link-vulnerability-management/
Arctic Wolf Observes Social Engineering Campaign Targeting IT Staff of Healthcare Providers to Reset User Credentials (Arctic Wolf)
Throughout multiple incidents, hospital help desks have received suspicious phone calls from unidentified individuals claiming to be doctors who had forgotten their password. When the callers were confronted with a request to verify their identities, including first name and department affiliation, the suspicious callers disconnected.
https://arcticwolf.com/resources/blog/arctic-wolf-observes-social-engineering-campaign-targeting-it-staff-of-healthcare-providers-reset-user-credentials/
The future of identity governance: fast, secure, and scalable (CyberArk)
Managing digital identities and access privileges is a significant challenge that only grows more difficult as cloud adoption accelerates, and environments and threats become increasingly complex.
https://www.cyberark.com/resources/blog/the-future-of-identity-governance-fast-secure-and-scalable
Thursday 6/19
Without automation, external attack surface management misses the point (Check Point)
With continuous attack surface management (ASM), teams can collect cyber security telemetry data from across their IT estates on an ongoing basis – so that whenever something new appears, they’ll know about it instantly.
https://blog.checkpoint.com/security/without-automation-external-attack-surface-management-misses-the-point/
Friday 6/20
Secure your business with Citrix and Google Chrome Enterprise Premium (Citrix)
Pairing the most trusted enterprise browser with Citrix Secure Private Access enables IT teams to deliver zero-trust access to private web, SaaS, and legacy applications without complex security infrastructure.
https://www.citrix.com/blogs/2025/06/17/secure-your-business-with-citrix-and-google-chrome-enterprise-premium/
Flask Phishing Kit: Targeted Credential Theft Using Open-Source Technology (Abnormal AI)
The threat actors didn't need cutting-edge exploits or expensive infrastructure. Instead, they took freely available, open-source technology and built a versatile phishing kit with minimal technical effort.
https://abnormal.ai/blog/flask-phishing-kit-credential-theft-attack
To Defend Your Data, Protect Your People Not Just Your Devices (Proofpoint)
The threat landscape has evolved over the years and continues to do so. The early days of viruses written by individuals infecting files to show off their programming skills has developed into a multimillion-dollar business. Threat actors work together buying and selling information and access. In today’s landscape, individual machines aren’t the targets.
https://www.proofpoint.com/us/blog/email-and-cloud-threats/defend-your-data-protect-your-people-not-just-your-devices