This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On September 26, 2025

Monday 9/22

What is Shadow AI and what is the risk to your organization? (Delinea)

Shadow IT issues are not new to organizations. Think unauthorized cloud purchases, unmanaged bring your own device (BYOD) programs, and rogue access points. Shadow AI is a natural consequence of governance lag. Users will always innovate with new technology faster than governance and security people can work to establish sane policies and effective guardrails.

https://delinea.com/blog/what-is-shadow-ai-and-what-is-the-risk-to-your-organization

When App-layer Privacy Fails: The Case for Data-layer Governance (Pure Storage)

App-level toggles will always struggle to protect sensitive data once it leaves its context. Enterprises need governance embedded where it cannot be bypassed: in the data layer and its control plane.

https://blog.purestorage.com/perspectives/pure-storage-app-data-layer-governance/

Tuesday 9/23

From Reactive to Proactive: Using AI to Classify and Protect Data That’s New or Unique to Your Organization (Proofpoint)

As environments grow more complex and dynamic, AI-powered classification can scale to handle petabytes of data and millions of files and messages. They can provide continuous insights to agentic security systems.

https://www.proofpoint.com/us/blog/dspm/ai-data-classification-proactive-data-protection

Beyond CVEs: The Exploitation of Everyday Misconfigurations (Wiz)

Cloud application misconfigurations - from unrestricted public exposure to default credentials and excessive permissions - are among the most common and effective ways attackers gain a foothold in an environment. Unlike a CVE with a clear patch and a vendor SLA, misconfigurations often fall through the cracks.

https://www.wiz.io/blog/beyond-cves-the-exploitation-of-everyday-misconfigurations

Wednesday 9/24

CIS Safeguard 6.6: Inventory Authentication and Authorization Systems

https://www.gothamtg.com/blog/cis-safeguard-66-inventory-authentication-and-authorization-sys

A practical guide to AI-ready machine identity governance in finance (CyberArk)

The explosion of machine identities in financial services is an undeniable reality. Unfortunately, most organizations lack clarity on managing their lifecycle, prioritizing risks, and governing their use. Machine identities aren’t inherently difficult to secure, but neglecting to integrate them into existing frameworks creates blind spots in even the most sophisticated cybersecurity strategies.

https://www.cyberark.com/resources/blog/a-practical-guide-to-ai-ready-machine-identity-governance-in-finance

The Ransomware Speed Crisis (Palo Alto Networks)

The ransomware speed crisis represents a fundamental shift in the cybersecurity landscape. As attacks continue to accelerate, the window for human-driven response continues to shrink. Organizations that adapt to this new reality (deploying AI-powered defenses, embracing automation and redesigning their security operations) will thrive.

https://www.paloaltonetworks.com/blog/2025/09/ransomware-speed-crisis/

Thursday 9/25

Vulnerability Management vs Exposure Management in Cybersecurity (Seemplicity)

Vulnerability management has always been about identification. Run the scans, flag the weaknesses, build the backlog. It’s a necessary foundation, but it stops short of telling you what actually matters.

https://seemplicity.io/blog/vulnerability-management-vs-exposure-management-in-cybersecurity/

Enterprise-Grade Security and Governance The Trust Foundation of AI Factories (NetApp)

Organizations that invest in security-first AI infrastructure capture full business value while meeting enterprise governance requirements, positioning themselves to lead in AI-driven markets rather than perpetually catching up. 

https://www.netapp.com/blog/enterprise-ai-security-zero-trust-ai-factory/

Friday 9/26

Quantum-Safe Cyber Security: Current Capabilities and the Road Ahead (Check Point)

While largescale quantum computers are not yet available, their future impact on cyber security is clear: algorithms like RSA,  Diffie–Hellman, and Elliptic Curve Diffie-Hellman which secure VPNs, TLS, and digital identities, will eventually be broken by quantum algorithms.

https://blog.checkpoint.com/innovation/quantum-safe-cyber-security-current-capabilities-and-the-road-ahead/

SaaS Sprawl: Conquering the Budget Terminator (ControlUp)

SaaS and AI growth isn’t slowing down, adding to more imperative to modernize and streamline operations sooner than later. Published data estimates large enterprises have more than 400 SaaS apps on average. SaaS spending, as a result, continues its steady rise.

https://www.controlup.com/resources/blog/saas-sprawl-conquering-the-budget-terminator/