This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On February 06, 2026

Monday 2/2

Why Citrix is the most complete EUC platform (Citrix)

Enterprises need a solution that addresses today’s challenges and prepares them for tomorrow. Citrix delivers by continuously enhancing our platform with features that improve performance, security, and management.

https://www.citrix.com/blogs/2026/01/26/why-citrix-is-the-most-complete-euc-platform/

Microsoft fixes Outlook bug blocking access to encrypted emails

Microsoft has fixed a known issue that prevented Microsoft 365 customers from opening encrypted emails in classic Outlook after a December update. This bug affects users who try to open messages encrypted with "Encrypt Only" permissions, a policy that doesn't restrict forwarding, printing, or copying the email.

https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-outlook-bug-blocking-access-to-encrypted-emails/

Tuesday 2/3

Automate Building Data Centers with Nutanix Infrastructure Manager (Nutanix)

As a mix of VM, container, and GenAI workloads becomes more prevalent and data sovereignty requirements push workloads across core datacenters, robo/edge sites, and public clouds, IT teams find themselves managing a complex web of workloads and infrastructure across multiple data centers, regions, and remote sites.

https://www.nutanix.com/blog/automate-building-data-centers-with-nutanix-infrastructure-manager#

How data strategy turns Zero Trust from vision to reality (Cribl)

Zero Trust means a lot of things to a lot of people. Too often, it’s treated like a product you can buy: sign a contract, flip on a new platform, and declare victory. In reality, zero trust is a journey and a methodology, not a black-box SKU.

https://cribl.io/blog/how-data-strategy-turns-zero-trust-from-vision-to-reality/

Wednesday 2/4

CIS Safeguard 8.4: Standardize Time Synchronization

https://www.gothamtg.com/blog/cis-safeguard-84-standardize-time-synchronization

System Notification Abuse: How Attackers Force Microsoft to Send Phishing Emails (Abnormal AI)

In this newly uncovered campaign, attackers exploit Microsoft Entra ID (formerly Azure AD) tenant branding features to inject scam messages directly into legitimate Microsoft system notifications. This technique transforms the platform itself into an unwitting accomplice, forcing it to send malicious messages on the attacker's behalf.

https://abnormal.ai/blog/system-notification-abuse-microsoft-phishing

AI agents are forcing a reckoning with identity and control (CyberArk)

As agents become more capable and more autonomous, they begin operating across systems at machine speed. They connect tools, provision access, and trigger chained actions long after the original request. Eventually, every incident review raises a deceptively simple question: Was this a person, or was it an agent acting like one?

https://www.cyberark.com/resources/blog/ai-agents-are-forcing-a-reckoning-with-identity-and-control

Thursday 2/5

ISPM and the relevance to board-level identity risk reduction (Delinea)

ISPM is evolving toward cross-platform privilege path visibility: the ability to identify “shadow admins” and indirect escalation routes across identity systems and cloud platforms, then give teams options—vault the account, restrict permissions, require step-up controls, enforce time-bound elevation, or accept and document the risk.

https://delinea.com/blog/identity-security-posture-management

Friday 2/6

How to Reduce Windows 365 Costs

Windows 365 offers a predictable, per-user monthly pricing model that simplifies cloud VDI budgeting. However, without proper oversight, costs can escalate due to over-provisioned resources and underutilized licenses. Proactive cost management is essential to maximize your return on investment and ensure your IT budget is allocated efficiently as your organization scales.

https://www.gothamtg.com/blog/how-to-reduce-windows-365-costs

How to Stop Auto-Updates from Killing Performance in Non-Persistent VDI (ControlUp)

Whether you’re using a read-only image or refreshing machines daily or weekly, you know exactly what your environment should look like every morning. Same OS, same applications, same versions. That predictability is one of the main reasons enterprises choose non-persistent desktops—it delivers stability, simplifies troubleshooting, and makes performance far more consistent. But there’s one silent disruptor that often goes unnoticed: auto-updates.

https://www.controlup.com/resources/blog/how-to-stop-auto-updates-from-killing-performance-in-non-persistent-vdi/

Claude Opus 4.6: Anthropic’s powerful model for coding, agents, and enterprise workflows is now available in Microsoft Foundry (Microsoft)

Claude Opus 4.6 brings Anthropic’s most advanced reasoning capabilities into Microsoft Foundry, our interoperable platform where intelligence and trust come together to enable autonomous work.

https://azure.microsoft.com/en-us/blog/claude-opus-4-6-anthropics-powerful-model-for-coding-agents-and-enterprise-workflows-is-now-available-in-microsoft-foundry-on-azure/