This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On March 27, 2026

Monday 3/16

When AI Writes the Code, Who Controls the Agents? (Rubrik)

Agents introduce a new category of risk. They operate autonomously as non-human identities with access to enterprise systems and data. And unlike traditional software, large language models are non-deterministic. Even well-designed agents can behave unpredictably.

https://www.rubrik.com/blog/company/26/3/when-ai-writes-the-code-who-controls-the-agents

Tuesday 3/17

Understanding and Reducing AI Risk in Modern Applications (Wiz)

Understanding AI risk across layers provides the necessary context. But identifying real risk also requires analyzing the signals that reveal how AI systems are implemented, configured, and exposed.

https://www.wiz.io/blog/reducing-ai-risk-across-ai-applications

From transparency to action: What the latest Microsoft email security benchmark reveals (Microsoft)

Microsoft’s quarterly analysis shows that layering ICES solutions with Microsoft Defender continue to provide a benefit in reducing marketing and bulk email, improving their filtering by an average of 13.7%. This reduces inbox clutter and boosts user productivity in environments with high volumes of promotional email.

https://www.microsoft.com/en-us/security/blog/2026/03/12/from-transparency-to-action-what-the-latest-microsoft-email-security-benchmark-reveals/

When Every Attack is a Novel Attack, You Need a New Kind of Defense (Abnormal AI)

Organizations are facing AI-powered attacks that rarely reuse infrastructure, payloads, or language. Point solutions and rule stacks struggle because they don’t baseline against how each organization normally behaves.

https://abnormal.ai/blog/attune-email-security-human-risk

Wednesday 3/18

CIS Safeguard 8.8: Collect Command-Line Audit Logs

https://www.gothamtg.com/blog/cis-safeguard-88-collect-command-line-audit-logs

Rethinking SaaS access security after login (CyberArk)

Important activity takes place with limited visibility, evidence ends up scattered or incomplete, and teams are left trying to reconstruct sessions instead of reviewing clear records. This creates friction for security and compliance, even when the right access controls are already in place.

https://www.cyberark.com/resources/blog/rethinking-saas-access-security-after-login

Augmented Phishing: Social Engineering in the Age of AI (Check Point)

AI has accelerated the scale and complexity of phishing attacks, drastically shortening the time window for human judgment. Effective defense now relies on realistic, multi-channel simulations, rapid training, and institutionalized verification rituals rather than traditional lectures.

https://blog.checkpoint.com/services/augmented-phishing-social-engineering-in-the-age-of-ai/

Monday 3/23

Check Point Accelerates the Rollout of Secure AI Data Centers with NVIDIA DSX Air (Check Point)

Bringing AI into data centers requires rethinking the entire cyber security architecture; the new threat surface expands far beyond traditional IT. The integration of AI systems and agents combined with hyperconnectivity to vast enterprise databases and systems creates the ultimate target-rich environment for threat actors of all kinds

https://blog.checkpoint.com/artificial-intelligence/check-point-accelerates-the-rollout-of-secure-ai-data-centers-with-nvidia-dsx-air/

Speed Is Not Enough: Why Intelligence Is the Missing Link in Microsoft 365 Recovery (Rubrik)

While 95% of the battle in a Microsoft 365 outage is getting the right data to the right people, true resilience requires a holistic view. Autonomous Business Recovery is the centerpiece, but it is supported by a unified platform that leaves no gaps for adversaries.

https://www.rubrik.com/blog/company/26/3/speed-is-not-enough-why-intelligence-is-the-missing-link-in-microsft-365-recovery

Tuesday 3/24

Unified cloud management: a practical approach to scaling Microsoft 365 and Azure for MSPs (Nerdio)

Without integrated automation, engineers are forced to rely on scripts and after-hours intervention to control spend. This approach is error-prone, difficult to standardize, and directly impacts margins. Policy tools were never designed to manage infrastructure consumption.

https://getnerdio.com/white-paper/unified-cloud-management-a-practical-approach-to-scaling-microsoft-365-and-azure-for-msps/

Building the Future of AI-Driven Cybersecurity (Arctic Wolf)

Across the industry, the promise of AI, and especially agentic AI for security operations, has generated excitement about a future where intelligent systems can plan, investigate, and take action alongside human experts. At the same time, security leaders have been rightfully cautious.

https://arcticwolf.com/resources/blog/building-the-future-of-ai-driven-cybersecurity/

Wednesday 3/25

CIS Safeguard 8.9: Centralize Audit Logs

https://www.gothamtg.com/blog/cis-safeguard-89-centralize-audit-logs

AI in Cybersecurity: Defender or Attacker’s Best Friend?

In cybersecurity, AI isn’t just helpful, it’s chaotic neutral. Because while defenders are using AI to stop attacks, attackers are using the same technology to get better at launching them. So, the real question is: Is AI your security team’s new MVP… or the hacker’s ultimate sidekick?

https://www.gothamtg.com/blog/ai-in-cybersecurity-defender-or-attackers-best-friend

Case study: How predictive shielding in Defender stopped GPO-based ransomware before it started (Microsoft)

Operational mechanisms like GPO can’t be permanently hardened, and that is exactly why threat actors pivot toward them. Predictive shielding closes this gap with contextual, just-in-time hardening that acts on predicted attacker intent rather than waiting for the attack to materialize.

https://www.microsoft.com/en-us/security/blog/2026/03/23/case-study-predictive-shielding-defender-stopped-gpo-based-ransomware-before-started/

Thursday 3/26

One year in: how our partnership with Google has matured secure access for the browser era (Citrix)

By using Chrome Enterprise, Google’s secure enterprise browser, and combining Citrix Secure Private Access with its granular ZTNA access controls to internal applications, we began addressing that gap: enabling browser-native, Zero Trust access that didn’t require new agents, new workflows, or new habits. Users opened Chrome and security policies followed them into the session.

https://www.citrix.com/blogs/2026/03/24/one-year-in-how-our-partnership-with-google-has-matured-secure-access-for-the-browser-era/

Friday 3/27

Meet the Industry’s First GPU-Powered SASE Platform with Native AI Security (Cato Networks)

Securing AI is not limited to software applications and agents. It requires hardware infrastructure capable of sustaining its scale, performance, and AI-grade compute intensity. Cato solves for both.

https://www.catonetworks.com/blog/industrys-first-gpu-powered-sase-platform-native-ai-security/

Proofpoint’s Data Risk Map turns visibility into protection (Proofpoint)

In modern environments, managing data risk can be overwhelming. Users and AI generate large volumes of data activity across collaboration platforms, cloud storage, endpoints, and on-premises systems that are hard to connect. The Data Risk Map simplifies this by bringing everything together in one place.

https://www.proofpoint.com/us/blog/information-protection/proofpoints-data-risk-map-turns-visibility-protection

Meeting federal zero trust mandates amid exploding identity risk (Delinea)

Federal directives, including the 2021 Executive Order on cybersecurity, require agencies to adopt zero trust frameworks, with implementation deadlines like the end of FY2027 for DoW and similar expectations across civilian agencies. CISA’s zero trust guidance provides a roadmap, but each organization must identify partners and tailor their path forward.

https://delinea.com/blog/federal-zero-trust-mandates-and-identity-risk