This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On May 15, 2026

Monday 5/11

How we’re tackling Microsoft 365 Copilot governance internally at Microsoft (Microsoft)

To ensure that proper data hygiene extends to AI-powered workflows, Microsoft designed Copilot to respect the sensitivity labels and data loss prevention (DLP) controls that organizations configure in their Microsoft Azure environment. That way, administrators can be confident that the right people and apps have access to the data they need, and that sensitive information doesn’t appear where it shouldn’t.

https://www.microsoft.com/insidetrack/blog/how-were-tackling-microsoft-365-copilot-governance-internally-at-microsoft/

Q1 2026 Ransomware Report: Fewer Groups, Higher Impact (Check Point)

The structure of the ransomware ecosystem changed materially. After two years of increasing fragmentation, activity is consolidating around a smaller number of dominant groups. For organizations, this shift reduces the number of active actors but increases the potential impact of individual incidents.

https://blog.checkpoint.com/research/q1-2026-ransomware-report-fewer-groups-higher-impact/

Tuesday 5/12

CIS Safeguard 10.4: Configure Automatic Anti-Malware Scanning of Removable Media

https://www.gothamtg.com/blog/cis-safeguard-104-configure-automatic-anti-malware-scanning-of-removable-media

10 Passkey Misconceptions That Are Slowing Down Your Security Modernization (HYPR)

The entire premise of a shared credential — where both the user and the server hold a copy of the same secret — is precisely what passkeys were engineered to eliminate. When you authenticate with a passkey, your device signs a unique cryptographic challenge using your private key.

https://www.hypr.com/blog/10-passkey-misconceptions-that-are-slowing-down-your-security-modernization

A Framework for AI Threat Readiness (Wiz)

As AI increases the speed of both software development and vulnerability discovery, the gap between exposure and exploitation is shrinking. Security programs need to continuously reduce the time between identification, validation, and remediation across code, infrastructure, and runtime.

https://www.wiz.io/blog/ai-threat-readiness-framework

Wednesday 5/13

The secure access model needs a rethink: Introducing Citrix Platform Flex (Citrix)

Citrix is announcing Citrix Platform Flex, a persona-based platform that delivers secure access, managed services, and observability through a predictable and flexible license model so organizations can align cost, resilience, performance, and user satisfaction to how work actually gets done.

https://www.citrix.com/blogs/2026/05/11/introducing-citrix-platform-flex/

5 Ways to Maximize Email Protection with Proofpoint (Proofpoint)

Maximizing protection requires more than basic coverage—it depends on complete visibility, consistent inspection, and the ability to act with confidence. When messages bypass inspection, threats reach inboxes, and investigations lack context, protection breaks down.

https://www.proofpoint.com/us/blog/email-and-cloud-threats/ways-to-get-reputable-outcomes-in-soc

Thursday 5/14

Defense at AI speed: Microsoft’s new multi-model agentic security system tops leading industry benchmark (Microsoft)

The strategic implication is clear: AI vulnerability discovery has crossed from research curiosity into production-grade defense at enterprise scale, and the durable advantage lies in the agentic system around the model rather than any single model itself.

https://www.microsoft.com/en-us/security/blog/2026/05/12/defense-at-ai-speed-microsofts-new-multi-model-agentic-security-system-tops-leading-industry-benchmark/

A Comprehensive Guide to Implementing Centralized Log Management (Cribl)

Successful implementations rely on lightweight collectors, common schemas, and resilient architecture so teams can normalize data, scale across Kubernetes and multi-region environments, and avoid gaps during failures.

https://cribl.io/blog/implementing-centralized-log-management/

Friday 5/15

Rethinking EUC in the age of agentic AI with Computer-Using Agents (CUA) (Nerdio)

Traditional EUC was designed around scarcity: limited devices, manual configuration, and reactive support. IT teams have spent years optimizing provisioning, patching, image management, and cost control, often just to keep up. But agents introduce a different set of requirements.

https://getnerdio.com/blog/rethinking-euc-in-the-age-of-agentic-ai-with-computer-using-agents-cua/

CrowdStrike Launches Falcon OverWatch for Defender (CrowdStrike)

Security tools remain essential, but not every sophisticated intrusion can be reliably detected through automation alone. Techniques including credential abuse, hands-on-keyboard activity, misuse of legitimate tools, and in-memory tradecraft are too subtle, novel, or context-dependent to automate high-fidelity detections for them without generating too much noise.

https://www.crowdstrike.com/en-us/blog/crowdstrike-launches-falcon-overwatch-for-defender/