Monday 12/22
Eon Cloud Backup: Transforming Data Protection for Modern Businesses
Eon Cloud Backup feels like an SDWAN for Backup. It delivers management and data planes across hyperscalers, abstracting each platform’s functions and capabilities into an easily manageable and highly automated solution. By leveraging underlying infrastructure, Eon creates a system that truly is greater than the sum of its parts.
https://www.gothamtg.com/blog/eon-cloud-backup-transforming-data-protection-for-modern-businesses
Azure Storage innovations: Unlocking the future of data (Microsoft)
Microsoft is redefining what’s possible in the public cloud and driving the next wave of AI-powered transformation for organizations. Whether you’re pushing the boundaries with AI, improving the resilience of mission-critical workloads, or modernizing legacy systems with cloud-native solutions, Azure Storage has a solution for you.
https://azure.microsoft.com/en-us/blog/azure-storage-innovations-unlocking-the-future-of-data/
Identity attacks are evolving faster than defenders can adapt (Delinea)
Attackers no longer need to “break in” when they can just authenticate their way through the front door. Identity shaped the entire threat landscape over the past month. Everything from supply chain malware to AI-assisted espionage depended on the ability to exploit trust relationships quickly and quietly.
https://delinea.com/blog/identity-attacks-are-evolving-faster-than-defenders-can-adapt
Tuesday 12/23
Microsoft Solved the Easy Identity Recovery Problem. But You Still Have to Solve the Hard One. (Rubrik)
A locked-out user isn't what breaks companies during identity attacks. It's the slow, quiet compromise of the identity control plane itself: the policies, roles, trusts, and permissions that decide whether anything in your environment is legitimate.
https://www.rubrik.com/blog/technology/25/12/microsoft-solved-the-easy-identity-recovery-problem-but-you-still-have-to-solve-the-hard-one
Phishing Attacks: Types, Statistics, and Prevention (Varonis)
Phishing has evolved into a sophisticated, multi-channel threat that continues to challenge organizations and individuals worldwide. Phishing attacks now exploit messaging apps, collaboration platforms, mobile devices, and phone calls. They leverage human trust and new technologies to bypass traditional defenses.
https://www.varonis.com/blog/phishing-explained
Monday 1/5
AI-Powered Classification for Structured Data: Bringing Context and Automation to Compliance (Cyera)
As organizations expand their digital footprints, locating and managing sensitive data has become increasingly complex. Structured data stores often hold the most sensitive and highly regulated information in the enterprise.
https://www.cyera.com/blog/ai-powered-classification-for-structured-data-bringing-context-and-automation-to-compliance
Navigating AI Adoption Without Losing Sight of Security (CyberCX)
Your organization’s AI and technology strategies shape the corresponding risk profile and determine the safeguards needed to manage it effectively. Whether embedding an AI feature or developing custom models, each stage of the AI Development Lifecycle introduces distinct security considerations.
https://cybercx.com/blog/navigating-ai-adoption-without-losing-sight-of-security/
Tuesday 1/6
CIS Safeguard 7.5: Perform Automated Vulnerability Scans of Internal Assets
https://www.gothamtg.com/blog/cis-safeguard-75-perform-automated-vulnerability-scans-of-internal
The Power of Unity (Palo Alto Networks)
The threat landscape is no longer defined by isolated malware or phishing emails. The modern attack surface has evolved into a dynamic, adaptive ecosystem, driven by automation and artificial intelligence.
https://www.paloaltonetworks.com/blog/2025/12/the-power-of-unity/
Microsoft announces acquisition of Osmos to accelerate autonomous data engineering in Fabric (Microsoft)
Today’s announcement reinforces Microsoft’s focus to help every organization unlock more value from their data faster and with greater simplicity. The Osmos team will join Microsoft’s Fabric engineering organization to advance our vision for simpler, more intuitive and AI-ready data experiences.
https://blogs.microsoft.com/blog/2026/01/05/microsoft-announces-acquisition-of-osmos-to-accelerate-autonomous-data-engineering-in-fabric/
Wednesday 1/7
Will AI agents ‘get real’ in 2026? (CyberArk)
Organizations that treat agents as privileged machine identities—discoverable, scoped, and carefully governed—can quickly contain issues. Those that don’t will likely find themselves chasing symptoms, with no clean way to shut something down without breaking everything else.
https://www.cyberark.com/resources/blog/will-ai-agents-get-real-in-2026
Announcing Abnormal’s Integration with CrowdStrike’s Malware Analysis Agent (Abnormal AI)
Abnormal AI and CrowdStrike deliver defense-in-depth malware analysis for suspicious email attachments, enabling faster investigations and confident response without disrupting SOC workflows.
https://abnormal.ai/blog/abnormal-crowdstrike-malware-investigation
Thursday 1/8
Generative AI security risks: what enterprises need to know right now (Proofpoint)
GenAI widens the attack surface, accelerates potential abuse, and lowers the barrier for threat actors. Security and IT teams must respond with a human-centric, behavior-aware approach that addresses both technical and human risks.
https://www.proofpoint.com/us/blog/information-protection/generative-ai-security-risks
The ROI of Modern DLP Solutions: Why It’s Worth the Investment (Cyberhaven)
When implemented effectively, modern DLP delivers significant return on investment by reducing incidents, cutting response costs, and enabling compliance. The question is no longer whether you can afford modern DLP — it’s whether you can afford not to have it.
https://www.cyberhaven.com/blog/roi-modern-dlp-solutions
Friday 1/9
CrowdStrike to Acquire SGNL to Secure Every Identity in the AI Era (CrowdStrike)
Today’s challenges require a new approach to securing privileged access, one that continuously evaluates identity risk and dynamically grants or revokes access as conditions change — something legacy access models and PAM solutions built on static policies and standing privileges were never designed to do.
https://www.crowdstrike.com/en-us/blog/crowdstrike-to-acquire-sgnl/