Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/30 Temporal hunting: Time as a threat hunting surface (Cribl) By embedding threat intelligence at the pipeline level and carrying it through federated searches, organizations gain a hunting workflow that thinks in time, not silos. Every pivot to hot alerts, warm logs, or long-term archives is accelerated and informed. https://cribl.io/blog/temporal-hunting-time-as-a-threat-hunting-surface/ Citrix + Amazon WorkSpaces Core: A Flexible Path to Cloud VDI Historically, Azure was effectively the onl... read more.

  • April 03, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In Blade Runner 2049 (2017), the central mystery hinges on memory. What was recorded, what was preserved, and what was lost determines who can understand the truth and who remains in the dark. The film makes a simple but powerful point: without reliable memory, reconstruction becomes speculation. CIS Safeguard 8.10 is built on that same idea. If audit logs are not retained long enough, incidents can’t... read more.

  • March 31, 2026

By Timothy Karl, Posted in Infrastructure

As more organizations look to move desktops to the cloud, many don’t want to give up the platforms they already rely on. For teams running Citrix, Amazon WorkSpaces Core offers a simple way to extend into AWS without starting over. This shift is important because, historically, Azure was effectively the only practical option for running Windows 10/11 multi-session desktops, especially for organizations aligned with Microsoft 365. In many cases, that meant customers were forced into Azure for VDI, eve... read more.

  • March 30, 2026

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/16 When AI Writes the Code, Who Controls the Agents? (Rubrik) Agents introduce a new category of risk. They operate autonomously as non-human identities with access to enterprise systems and data. And unlike traditional software, large language models are non-deterministic. Even well-designed agents can behave unpredictably. https://www.rubrik.com/blog/company/26/3/when-ai-writes-the-code-who-controls-the-agents Tuesday 3/17 Understanding and Reducing AI Risk in Modern Applications (Wiz) Unde... read more.

  • March 27, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In Apollo 11 (1969), hundreds of engineers didn’t sit scattered across the country making independent decisions. Instead, Mission Control in Houston became the single place where telemetry, voice communications, and system status converged. When something changed on the spacecraft, everyone who needed to know saw the same data, at the same time, and acted from a shared understanding. That is precisely... read more.

  • March 25, 2026

By Bert Amodol, Posted in Security

AI is everywhere in 2026. It writes your emails, summarizes your meetings, generates your vacation photos (that you didn’t actually take), and occasionally makes you wonder if it’s quietly coming for your job. But in cybersecurity, AI isn’t just helpful, it’s chaotic neutral. Because while defenders are using AI to stop attacks, attackers are using the same technology to get better at launching them. So, the real question is: Is AI your security team’s new MVP… or the... read more.

  • March 25, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In Star Wars: A New Hope (1977), when Han Solo is asked how he’ll evade Imperial forces, he doesn’t talk about grand strategy—he talks about what he’ll do at the controls of the Millennium Falcon. The outcome of the chase depends not on intent, but on the specific actions taken in the cockpit. In cybersecurity, command-line activity is that cockpit. CIS Safeguard 8.8 recognizes that... read more.

  • March 18, 2026

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/9 Inside the Engine: How Behavioral AI Deconstructs Modern ATO Attacks (Abnormal AI) By combining continuous signal ingestion, behavioral modeling, adaptive model updates, explainable verdicts, and integrated containment, Behavioral AI delivers a structurally different approach to account takeover detection. https://abnormal.ai/blog/inside-behavioral-ai-account-takeover-detection Tuesday 3/10 How Automatic Return Routing solves IP overlap (Cloudflare) ARR is an optional tool for Cloudflare On... read more.

  • March 13, 2026

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/23 Why IVIP is reshaping IAM via (Axonius) IVIP fills that gap with a continuous identity intelligence layer that turns fragmented identity data into something teams can trust and act on. And that change is beginning to reshape the entire IAM market. https://www.axonius.com/blog/why-ivip-is-reshaping-iam DLP Monitoring Implementation Framework: From Planning to Production in 90 Days (Cyera) A successful DLP monitoring framework depends on how well the program balances usability and a... read more.

  • March 06, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In The Truman Show (1998), Truman Burbank slowly realizes that his world isn’t random. Every street he walks down, every destination he tries to reach, is subtly redirected or observed. What finally tips him off isn’t a single event, it’s the pattern of where he’s allowed to go and where he isn’t. That idea maps well to CIS Safeguard 8.7: Collect URL Request Audit Logs. In mode... read more.

  • March 04, 2026