Monday 10/6
The invisible threat: Machine identity sprawl and expired certificates (CyberArk)
Without central visibility, security teams inherit overlapping responsibilities and no clear ownership, allowing keys and secrets to remain unrotated or misconfigured and certificates to expire silently. That is, until they break something critical.
https://www.cyberark.com/resources/blog/the-invisible-threat-machine-identity-sprawl-and-expired-certificates
Tuesday 10/7
5 Essential Cyber Security Tips for Cyber Security Awareness Month (Check Point)
In today’s digital landscape, cyber threats are constantly evolving, targeting individuals and organizations alike with increasingly sophisticated tactics. Whether you’re scrolling social media, checking emails, or downloading apps, cyber criminals are always looking for new ways to exploit vulnerabilities.
https://blog.checkpoint.com/executive-insights/5-essential-cyber-security-tips-for-cyber-security-awareness-month/
The Human Factor in Cybersecurity: How to Reduce Risk, Build Culture, and Strengthen Resilience (Arctic Wolf)
In today’s cybersecurity landscape, one thing remains constant: humans are both our greatest asset and our biggest risk. Despite increasingly sophisticated technology, human risk, insider threats, and social engineering attacks like phishing, continue to lead the charge when it comes to successful breaches.
https://arcticwolf.com/resources/blog/the-human-factor-in-cybersecurity-how-to-reduce-risk-build-culture-and-strengthen-resilience/
Why the Great Backup vs. Snapshot Debate Misses the Point (Rubrik)
Fragmentation creates critical gaps in cyber resilience. Storage snapshots provide speed but limited threat visibility. Backup systems offer security but operate independently from primary storage intelligence. The result? During a cyberattack, you're forced to choose between fast recovery from potentially infected snapshots or slow recovery from backups you hope are clean.
https://www.rubrik.com/blog/technology/25/10/why-the-great-backup-vs-snapshot-debate-misses-the-point
Wednesday 10/8
Defending against database ransomware attacks (Wiz)
While classic ransomware attacks typically involve infecting the target environment with malicious programs that encrypt files on the disk using a key known only to the attacker, database ransomware doesn’t encrypt data at all - instead, attackers use the database’s own built-in functionality (queries and commands) to render the data unavailable.
https://www.wiz.io/blog/database-ransomware-research
The Case for Multidomain Visibility (Palo Alto Networks)
The risk goes beyond data loss and extortion: an attacker with database access can often escalate their privileges to achieve Remote Code Execution (RCE). Once this foothold is established they can begin to move laterally in your environment using the compromised server as a jumping-off point to discover and attack other systems.
https://www.paloaltonetworks.com/blog/2025/10/case-for-multidomain-visibility/
Thursday 10/9
Impact Solutions: The Point-and-Click Toolkit Democratizing Malware Delivery (Abnormal AI)
These examples show that Impact Solutions isn’t just about the payload files; it’s about the stories and disguises those files come wrapped in. By leveraging familiar icons and common business themes, as well as impersonating trusted services, attackers maximize the chances that a target will be deceived.
https://abnormal.ai/blog/impact-solutions-democratizing-malware-delivery
Simplify and secure without stress: an executive blueprint for streamlined app delivery (Citrix)
Whether your apps run on virtual machines, lift-and-shifted services, or containers, one truth holds: the network your apps depend on is only as reliable as the processes around it. Fragmented tooling, duplicated policies, and manual handoffs create avoidable risk—no matter if the traffic originates in a data center, a private cloud, or a Kubernetes cluster.
https://www.citrix.com/blogs/2025/10/02/an-executive-blueprint-for-streamlined-app-delivery/
Friday 10/10
Shadow AI risk: Navigating the growing threat of ungoverned AI adoption (Delinea)
To effectively mitigate the risks associated with shadow AI and ungoverned AI adoption, organizations must prioritize developing and implementing comprehensive AI security policies. These policies should encompass acceptable use guidelines, access controls, activity logging and auditing, and identity governance for AI entities.
https://delinea.com/blog/navigating-growing-threat-ungoverned-ai-adoption
Modernizing Infrastructure: A C-Suite Guide to Distributed Hybrid Infrastructure (Nutanix)
Digital transformation demands infrastructure that seamlessly spans cloud, edge, and on-premises environments. Distributed Hybrid Infrastructure (DHI) enables this unified operational model—reducing complexity, enhancing agility, and supporting workload mobility and policy enforcement.
https://www.nutanix.com/blog/modernizing-infrastructure-a-c-suite-guide-to-distributed-hybrid-infrastructure