Monday 1/26
A strong EUC and cloud strategy isn’t one-size-fits-all. It’s about identifying the solutions that make the most sense for your business. Gotham delivers tailored EUC solutions that align directly with your business objectives, driving productivity, security, and scalability.
If you are a current Gotham customer contact your Gotham rep or if you are new to us please contact our Business Development Representative Sierra Birmingham for a link to the full webinar where Gotham’s Ryan Lee, Nerdio’s Jesse Crespo, and Microsoft’s Jay Lockwood discuss how we can help enhance your company’s Azure Virtual Desktop and Windows 365 experience.
Why Identity Abuse Defines Modern Account Takeover (Abnormal AI)
Modern breaches increasingly begin with trusted access rather than malware or software exploits. By abusing credentials and permissions granted to legitimate identities, attackers gain initial access to systems, data, and business processes across the enterprise.
https://abnormal.ai/blog/identity-abuse-account-takeover
Tuesday 1/26
CIS Safeguard 7.7: Remediate Detected Vulnerabilities
https://www.gothamtg.com/blog/cis-safeguard-77-remediate-detected-vulnerabilities
Why Live Remote Management is The Future of DEX Management (ControlUp)
Delayed data makes troubleshooting inefficient and unreliable. When an IT administrator sees CPU spikes on a device, but the monitoring dashboard shows something different, trust in the tool erodes and root cause analysis becomes nearly impossible.
https://www.controlup.com/resources/blog/live-remote-management-the-future-of-dex-management/
Microsoft reveals second generation of its AI chip in effort to bolster cloud business (CNBC)
Microsoft is outfitting its U.S. Central region of data centers with Maia 200 chips, and they’ll arrive at the U.S. West 3 region after that, with additional locations to follow.
https://www.cnbc.com/2026/01/26/microsoft-reveals-maia-200-ai-chip-will-use-it-in-house.html
Wednesday 1/28
Saying Goodbye to Windows Hello for Business: Five User Experience Pitfalls that Make Business Leaders Go for Best-in-Breed Solutions (HYPR)
When inconsistent experiences push users to PINs and passwords, when fallback options are always visible, when shared workstations and non-Windows devices are treated as edge cases, and when recovery and re-enrollment become disruptive events, security doesn’t fail loudly. It erodes quietly
https://www.hypr.com/blog/saying-goodbye-to-windows-hello-for-business
AI-Powered Forensics, at Cloud Speed (Wiz)
Context-aware forensics, captured by the Wiz Sensor and powered by AI, is now in public preview, and brings our forensics approach to life at runtime. In the cloud, evidence disappears by attacker design, and traditional infrastructure makes it harder to retrieve the evidence that teams need.
https://www.wiz.io/blog/ai-powered-wiz-forensics
Why Manual Data Mapping Fails in the Age of Agentic AI (Cyera)
As organizations adopt cloud platforms, SaaS tools, APIs, and autonomous AI agents, the pace and autonomy of data processing has outgrown human-reported mapping. Manual data mapping by privacy teams is no longer just inefficient. It is structurally incapable of scaling to keep up when solely supported by human input.
https://www.cyera.com/blog/why-manual-data-mapping-fails-in-the-age-of-agentic-ai
Thursday 1/29
Why Identity Incidents Are So Disruptive (Rubrik)
Identity resilience is no longer about protecting individual configurations. It is about understanding how identity systems relate to one another and being able to restore those relationships safely.
https://www.rubrik.com/blog/technology/26/1/the-real-reason-identity-incidents-are-so-disruptive
What Is EDR Security? (Arctic Wolf)
An effective EDR solution allows security teams to focus on detecting and investigating suspicious activities on endpoints, creating faster, more effective responses. EDR allows organizations to focus on proactive cybersecurity, taking in and acting on data around their endpoints before a threat escalates.
https://arcticwolf.com/resources/blog/what-is-edr-and-how-does-it-fit-into-your-security-strategy/
Friday 1/30
Leveraging Virtualization Strategy for Digital Transformation (Nutanix)
Virtualization directly addresses these priorities by abstracting hardware and creating a software-defined environment that is flexible, scalable, and easier to manage. This allows IT to move from being a cost center to a strategic enabler of business innovation.
https://www.nutanix.com/blog/virtualization-strategy-digital-transformation
Data Discovery Is Not Data Security (Varonis)
In cloud-native environments, discovery does not reveal risk — it reveals only the surface of a deeply interconnected ecosystem. And when typical discovery tools declare “you have a problem here,” they give you a help-desk ticket, not a fix.
https://www.varonis.com/blog/data-discovery-is-not-data-security