This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On March 06, 2026

Monday 2/23

Why IVIP is reshaping IAM via (Axonius)

IVIP fills that gap with a continuous identity intelligence layer that turns fragmented identity data into something teams can trust and act on. And that change is beginning to reshape the entire IAM market.

https://www.axonius.com/blog/why-ivip-is-reshaping-iam

DLP Monitoring Implementation Framework: From Planning to Production in 90 Days (Cyera)

A successful DLP monitoring framework depends on how well the program balances usability and adaptability. The following factors help teams maintain long-term performance, reduce resistance from users, and keep the system evolving as data environments change.

https://www.cyera.com/blog/dlp-monitoring-implementation-framework-from-planning-to-production-in-90-days

Tuesday 2/24

ICYMI: On February 19, 2026, Gotham's CTO, Ken Phelan, was joined by Hotman Group's Partner and vCISO, Cheri Hotman, to discuss how an effective GRC program can align cybersecurity practices with business objectives.

Click the link below for the full video

https://youtube.com/watch?v=WCZl-jYMACk

CIS Safeguard 8.6: Collect DNS Query Audit Logs

https://gothamtg.com/blog/cis-safeguard-86-collect-dns-query-audit-logs

Context-Based Attestation for Identity Verification (HYPR)

Comprehensive identity verification workflows including document verification, location detection, facial recognition and liveliness detection provide a strong foundation. Context-based attestation builds on that foundation by continuously validating whether the person interacting with a system aligns with their previously verified identity through real-world context.

https://www.hypr.com/blog/context-based-attestation-a-practical-approach-to-high-confidence-identity-verification

Wednesday 2/25

Scaling security operations with Microsoft Defender autonomous defense and expert-led services (Microsoft)

The shift toward autonomous defense starts with unifying how security operations work. Fragmented tools force teams to interpret cyberthreats one signal at a time, leaving context scattered and response uneven.

https://www.microsoft.com/en-us/security/blog/2026/02/24/scaling-security-operations-with-microsoft-defender-autonomous-defense-and-expert-led-services/

Exposing Insider Threats through Data Protection, Identity, and HR Context (CrowdStrike)

Available to organizations with Falcon Data Protection and Falcon Next-Gen Identity Security, the dashboard combines automated risk indicator scoring with behavioral hunting capabilities to identify high-risk users and suspicious activity patterns requiring further investigation.

https://www.crowdstrike.com/en-us/blog/exposing-insider-threats-through-data-protection-identity-hr-context/

Tuesday 3/3

Why Cybersecurity Still Matters Even If AI Improves Secure Development (Arctic Wolf)

Enthusiasm about future innovation should not obscure reality. Even in a hypothetical world where software vulnerabilities could largely disappear, cybersecurity would remain both necessary and complex.

https://arcticwolf.com/resources/blog/why-cybersecurity-still-matters-even-if-ai-improves-secure-development/

Visibility: Identity Discover and Strategic Risk Reduction (Delinea)

Modern breaches often do not begin with zero-day exploits. They begin with compromised credentials or misconfigured permissions. From there, attackers move laterally, leveraging excessive privileges, trust relationships, and identity inheritance paths that security teams didn’t fully map.

https://delinea.com/blog/visibility-identity-discover-and-strategic-risk-reduction

Wednesday 3/4

CIS Safeguard 8.7: Collect URL Request Audit Logs

https://www.gothamtg.com/blog/cis-safeguard-87-collect-url-request-audit-logs

SharePoint at 25: How Microsoft is putting knowledge to work in the AI era (Microsoft)

SharePoint is indispensable for making AI useful at work, as it is now the number one grounding source for Microsoft 365 Copilot. This makes SharePoint foundational to Work IQ, the intelligence layer behind Microsoft 365 Copilot and agents, enabling them to understand you, your job, and your company.

https://www.microsoft.com/en-us/microsoft-365/blog/2026/03/02/sharepoint-at-25-how-microsoft-is-putting-knowledge-to-work-in-the-ai-era/

GitHub Backup and Recovery: Securing Your Innovation Engine Against Modern Threats (Rubrik)

Protecting your source code and automation pipelines is too critical to be an afterthought. Rubrik brings the same enterprise-grade, automated, and cyber-resilient data protection you already trust for your cloud and SaaS workloads directly to your GitHub environment.

https://www.rubrik.com/blog/technology/26/3/github-backup-and-recovery-securing-your- on-engine-against-modern-threats

Thursday 3/5

Rethinking SaaS access security after login (CyberArk)

Once a user is authenticated, many security tools stop paying attention. Sessions stay open, tabs linger, and activity becomes harder to distinguish. And whether it’s a legitimate employee, a third-party contractor, or an attacker using stolen session tokens, what happens inside the web sessions often goes unseen.

https://www.cyberark.com/resources/blog/rethinking-saas-access-security-after-login

Seeing AI Clearly: Building Visibility Across Modern AI Applications (Wiz)

AI applications span models, agents, and cloud environments in ways traditional security tools weren’t designed to understand. Here’s why visibility breaks — and how a new, implementation-agnostic approach helps teams safely adopt AI.

https://www.wiz.io/blog/complete-ai-application-visibility-wiz

Friday 3/6

Modern observability on Nutanix Kubernetes Platform powered by Cribl Edge (Cribl)

By standardizing collection with Cribl Edge on Nutanix Kubernetes, you get a single, trusted layer for metrics, logs, and events—enriched with Nutanix and Kubernetes context, routed with precision, and stored on low-cost object storage when you need full-fidelity history.

https://cribl.io/blog/modern-observability-on-nutanix-kubernetes-platform-powered-by-cribl-edge/