This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On January 09, 2026

Monday 12/22

Eon Cloud Backup: Transforming Data Protection for Modern Businesses

Eon Cloud Backup feels like an SDWAN for Backup. It delivers management and data planes across hyperscalers, abstracting each platform’s functions and capabilities into an easily manageable and highly automated solution. By leveraging underlying infrastructure, Eon creates a system that truly is greater than the sum of its parts.

https://www.gothamtg.com/blog/eon-cloud-backup-transforming-data-protection-for-modern-businesses

Azure Storage innovations: Unlocking the future of data (Microsoft)

Microsoft is redefining what’s possible in the public cloud and driving the next wave of AI-powered transformation for organizations. Whether you’re pushing the boundaries with AI, improving the resilience of mission-critical workloads, or modernizing legacy systems with cloud-native solutions, Azure Storage has a solution for you.

https://azure.microsoft.com/en-us/blog/azure-storage-innovations-unlocking-the-future-of-data/

Identity attacks are evolving faster than defenders can adapt (Delinea)

Attackers no longer need to “break in” when they can just authenticate their way through the front door. Identity shaped the entire threat landscape over the past month. Everything from supply chain malware to AI-assisted espionage depended on the ability to exploit trust relationships quickly and quietly.

https://delinea.com/blog/identity-attacks-are-evolving-faster-than-defenders-can-adapt

Tuesday 12/23

Microsoft Solved the Easy Identity Recovery Problem. But You Still Have to Solve the Hard One. (Rubrik)

A locked-out user isn't what breaks companies during identity attacks. It's the slow, quiet compromise of the identity control plane itself: the policies, roles, trusts, and permissions that decide whether anything in your environment is legitimate.

https://www.rubrik.com/blog/technology/25/12/microsoft-solved-the-easy-identity-recovery-problem-but-you-still-have-to-solve-the-hard-one

Phishing Attacks: Types, Statistics, and Prevention (Varonis)

Phishing has evolved into a sophisticated, multi-channel threat that continues to challenge organizations and individuals worldwide. Phishing attacks now exploit messaging apps, collaboration platforms, mobile devices, and phone calls. They leverage human trust and new technologies to bypass traditional defenses.

https://www.varonis.com/blog/phishing-explained

Monday 1/5

AI-Powered Classification for Structured Data: Bringing Context and Automation to Compliance (Cyera)

As organizations expand their digital footprints, locating and managing sensitive data has become increasingly complex. Structured data stores often hold the most sensitive and highly regulated information in the enterprise.

https://www.cyera.com/blog/ai-powered-classification-for-structured-data-bringing-context-and-automation-to-compliance

Navigating AI Adoption Without Losing Sight of Security (CyberCX)

Your organization’s AI and technology strategies shape the corresponding risk profile and determine the safeguards needed to manage it effectively. Whether embedding an AI feature or developing custom models, each stage of the AI Development Lifecycle introduces distinct security considerations.

https://cybercx.com/blog/navigating-ai-adoption-without-losing-sight-of-security/

Tuesday 1/6

CIS Safeguard 7.5: Perform Automated Vulnerability Scans of Internal Assets

https://www.gothamtg.com/blog/cis-safeguard-75-perform-automated-vulnerability-scans-of-internal

The Power of Unity (Palo Alto Networks)

The threat landscape is no longer defined by isolated malware or phishing emails. The modern attack surface has evolved into a dynamic, adaptive ecosystem, driven by automation and artificial intelligence. 

https://www.paloaltonetworks.com/blog/2025/12/the-power-of-unity/

Microsoft announces acquisition of Osmos to accelerate autonomous data engineering in Fabric (Microsoft)

Today’s announcement reinforces Microsoft’s focus to help every organization unlock more value from their data faster and with greater simplicity. The Osmos team will join Microsoft’s Fabric engineering organization to advance our vision for simpler, more intuitive and AI-ready data experiences.

https://blogs.microsoft.com/blog/2026/01/05/microsoft-announces-acquisition-of-osmos-to-accelerate-autonomous-data-engineering-in-fabric/

Wednesday 1/7

Will AI agents ‘get real’ in 2026? (CyberArk)

Organizations that treat agents as privileged machine identities—discoverable, scoped, and carefully governed—can quickly contain issues. Those that don’t will likely find themselves chasing symptoms, with no clean way to shut something down without breaking everything else.

https://www.cyberark.com/resources/blog/will-ai-agents-get-real-in-2026

Announcing Abnormal’s Integration with CrowdStrike’s Malware Analysis Agent (Abnormal AI)

Abnormal AI and CrowdStrike deliver defense-in-depth malware analysis for suspicious email attachments, enabling faster investigations and confident response without disrupting SOC workflows.

https://abnormal.ai/blog/abnormal-crowdstrike-malware-investigation

Thursday 1/8

Generative AI security risks: what enterprises need to know right now (Proofpoint)

GenAI widens the attack surface, accelerates potential abuse, and lowers the barrier for threat actors. Security and IT teams must respond with a human-centric, behavior-aware approach that addresses both technical and human risks.

https://www.proofpoint.com/us/blog/information-protection/generative-ai-security-risks

The ROI of Modern DLP Solutions: Why It’s Worth the Investment (Cyberhaven)

When implemented effectively, modern DLP delivers significant return on investment by reducing incidents, cutting response costs, and enabling compliance. The question is no longer whether you can afford modern DLP — it’s whether you can afford not to have it.

https://www.cyberhaven.com/blog/roi-modern-dlp-solutions

Friday 1/9

CrowdStrike to Acquire SGNL to Secure Every Identity in the AI Era (CrowdStrike)

Today’s challenges require a new approach to securing privileged access, one that continuously evaluates identity risk and dynamically grants or revokes access as conditions change — something legacy access models and PAM solutions built on static policies and standing privileges were never designed to do.

https://www.crowdstrike.com/en-us/blog/crowdstrike-to-acquire-sgnl/