This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On May 01, 2026

Monday 4/27

The Network Perimeter Is Re-Emerging: What This Means for Modern SOCs (Adlumin)

Organizations that optimized for a single layer of defense are finding themselves vulnerable to attacks they cannot even see. By examining the findings from the 2026 report, IT leaders can understand why this shift occurred, the risks of relying on isolated security tools, and how to build a unified strategy that stops modern threats.

https://www.n-able.com/blog/the-network-perimeter-is-re-emerging-what-this-means-for-modern-socs

Microsoft Discovery: Advancing agentic R&D at scale (Microsoft)

The Microsoft Discovery platform continues to evolve with new capabilities, expanded partner interoperability, and a growing set of results with real-world scientific outcomes and engineering transformation. We believe what comes next can meaningfully change how R&D teams operate and empower them to achieve more.

https://azure.microsoft.com/en-us/blog/microsoft-discovery-advancing-agentic-rd-at-scale/

Tuesday 4/28

CIS Safeguard 9.5: Implement DMARC

https://www.gothamtg.com/blog/cis-safeguard-95-implement-dmarc

Automation at Machine Speed: Rethinking Execution in Modern Cybersecurity (SentinelOne)

In today’s landscape where we are seeing a shrinking window for response, adversaries are operating almost entirely at machine speed. In this environment, human operators alone cannot respond fast enough to prevent compromise. Automation enables defenders to reclaim the tempo.

https://www.sentinelone.com/blog/automation-at-machine-speed-rethinking-execution-in-modern-cybersecurity/

NIST NVD Update: What it Means For Vulnerability Management (Wiz)

Recently, NIST announced an update to how the National Vulnerability Database (NVD) handles CVE enrichment to address the massive surge in vulnerability submissions. In the announcement, NIST indicated that the number of submissions increased by 263% between 2020 and 2025- requiring them to adopt a new, risk-based model to handle CVE prioritization.

https://www.wiz.io/blog/nist-nvd-update

Wednesday 4/29

Announcing Citrix SDS support on Nutanix NKP: Solving the developer platform puzzle (Citrix)

For organizations already relying on Citrix DaaS for secure workforce productivity and Citrix NetScaler for high-performance application delivery on Nutanix, SDS adds a powerful developer-environment layer to an established and trusted Citrix platform strategy, extending secure access, governance, and operational consistency into modern cloud-native engineering workflows.

https://www.citrix.com/blogs/2026/04/28/announcing-citrix-sds-support-on-nutanix-nkp-solving-the-developer-platform-puzzle/

How to Prevent Business Email Compromise (BEC) Attacks (Proofpoint)

Many organizations already have email security in place, but BEC attacks still get through. The issue is that they don’t look malicious—they look like normal business communication, which makes them difficult for traditional controls to detect.

https://www.proofpoint.com/us/blog/email-and-cloud-threats/how-prevent-business-email-compromise-bec-attacks

Thursday 4/30

Securing privileged access in OT without disrupting operations (Delinea)

OT risk rarely sits in one place. A service account with broad permissions, a remote vendor connection with little oversight, and an engineering workstation running with local admin rights can all exist in the same environment and amplify each other. Improving control across the full access path delivers more value.

https://delinea.com/blog/securing-privileged-access-in-operation-technology-ot

Friday 5/1

Why Human-Targeted Attacks Are Overwhelming Security Teams (Abnormal AI)

Instead of probing for system weaknesses, attackers now study human behavior. They observe how executives communicate, how vendors interact, and how conversations unfold. With that insight, they craft messages that feel authentic—matching tone, timing, and intent closely enough to slip through unnoticed.

https://abnormal.ai/blog/why-human-targeted-attacks-are-overwhelming-security-teams

Automating Regulatory Compliance with Security Reporting and Remediation (Nutanix)

Automated remediation is what closes the detection-to-resolution loop and transforms compliance from episodic to continuous. Detection alone doesn’t maintain compliance — rapid, consistent remediation does.

https://www.nutanix.com/blog/regulatory-compliance-automation-with-security-reporting-and-remediation