This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On September 12, 2025

Monday 9/8

What Is a Hybrid Mesh Firewall and Why It Matters (Palo Alto Networks)

A hardware-only approach leaves gaps at the edge, while cloud-only firewalls can’t provide consistent protection across on-premises infrastructure. The result is operational complexity with blind spots and an expanding attack surface.

https://www.paloaltonetworks.com/blog/2025/08/hybrid-mesh-firewall-and-why-it-matters/

Cybersecurity Stop of the Month: BEC Attacks Targeting Government Agencies (Proofpoint)

What makes BEC threats so dangerous is that they typically don't involve malicious links or malware payloads. Instead, cybercriminals rely on lies, impersonation, and social engineering tactics to bypass traditional security defenses. Attacks that don’t have payloads are a blind spot for many security vendors.

https://www.proofpoint.com/us/blog/email-and-cloud-threats/rice-bec-attacks-targeting-government-agencies

Wednesday 9/10

Microsoft Direct Send Abuse: Why Legacy Defenses Fall Short (Abnormal AI)

A growing trend in 2025 involves the abuse of Microsoft 365’s Direct Send feature, a legitimate functionality that, in the wrong hands, can be weaponized to bypass authentication checks, fool legacy defenses, and land directly in user inboxes.

https://abnormal.ai/blog/microsoft-direct-send-abuse-phishing-attacks

The Networking and Security Shifts Fueling the Rise of SASE (Check Point)

With data, users, and devices now dispersed far beyond the corporate firewall, the notion that you can protect everything with a fixed security perimeter is quaint – but obsolete. SASE embraces a “security everywhere” model that applies policies based on identity, device posture, location, and risk level, rather than static network boundaries.

https://blog.checkpoint.com/harmony-sase/the-networking-and-security-shifts-fueling-the-rise-of-sase/

Thursday 9/11

AI Didn’t Break Storage. It Just Exposed It (Pure Storage)

In today’s data-hungry, fast-paced, AI-driven world, the old approach to storage doesn’t work. A foundational shift needs to happen that enables your storage to work for your data.

https://blog.purestorage.com/perspectives/ai-didnt-break-storage-enterprise-data-cloud/

Making Self-Service Password Reset and Account Recovery Secure (HYPR)

SSPR and SSAR are self-service features that allow users to reset their passwords or recover access to their accounts without needing help from an IT professional. While this can drastically cut operational costs and reduce help desk tickets, it introduces a significant security issue.

https://blog.hypr.com/making-self-service-password-reset-and-account-recovery-secure

Friday 9/12

Elevating your Citrix experience: Innovation, efficiency, and the future of licensing (Citrix)

By embracing this modern licensing approach, you’re not just ensuring compliance; you’re investing in a future of continuous innovation, enhanced operational efficiency, and a more robust, insight-driven Citrix experience. 

https://www.citrix.com/blogs/2025/09/08/elevating-your-citrix-experience-innovation-efficiency-and-the-future-of-licensing/

Is autofill safe? Clickjacking risks and security tradeoffs explained (CyberArk)

Clickjacking is a web attack that’s been around for years. What’s different about this latest research is the focus on autofill in browser extensions, which brings fresh attention to a technique security teams have been tracking for some time. But autofill itself is not inherently unsafe—in fact, when paired with the right safeguards, it’s often safer than the alternatives.

https://www.cyberark.com/resources/blog/is-autofill-safe-clickjacking-risks-and-security-tradeoffs-explained