Articles by 'Eric Corcoran'

Blog Author - Eric Corcoran

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/3 New Proofpoint Innovations That Help You to Defend Data and Mitigate Insider Risks (Proofpoint) Keeping data safe is more than just enforcing policies in a reactive manner—it’s about knowing where the risks come from and being proactive. Proofpoint Data Security helps organizations discover, classify and protect data. https://www.proofpoint.com/us/blog/information-protection/innovations-to-data-security-insider-risk-mitigation Identity Verification Trends in 2025 … and Beyo... read more.

  • March 07, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/24 2025 State of Code Security: Key Trends and Risks (Wiz) The data is clear: unmanaged risks in code and version control systems present significant challenges for the modern enterprise. From alarming levels of secrets exposure to insecure CI/CD workflows, these vulnerabilities jeopardize production environments.  https://www.wiz.io/blog/state-of-code-security-report-2025 Proofpoint Research: 2024 Account Takeover Statistics (Proofpoint) Attackers’ focus on compromising accounts is... read more.

  • February 28, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/17 The Role of Runtime Security in Cloud Environments (Wiz) As cloud adoption accelerates, security teams must protect dynamic, cloud-native environments that include containers, serverless functions, and virtual machines (VMs). Runtime cloud security refers to the continuous monitoring and protection of workloads while they are actively running in production environments.  https://www.wiz.io/blog/the-role-of-runtime-security-in-cloud-environments Why Data Tiering is Critical for Modern Se... read more.

  • February 21, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/10 AI vs. AI: What Attackers Know Could Hurt You (Abnormal Security) AI is pushing the envelope for hackers and other bad actors, but it's also giving security professionals a powerful new weapon. In 2025, the biggest threat will be to organisations that ignore the writing on the wall and continue to pour resources into solutions that are no match for AI-driven attacks. https://abnormalsecurity.com/blog/ai-vs-ai-attackers-could-hurt-you Reimagining Your SOC: Overcoming Alert Fatigue with A... read more.

  • February 14, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/3 6 building blocks of a winning identity security strategy (Delinea) Identity strategy is not just about ensuring humans and non-humans have the right access; it's also about enhancing the security mechanisms that protect sensitive information from unauthorized access and breaches. https://delinea.com/blog/6-building-blocks-of-a-winning-identity-security-strategy Tuesday 2/4 Staying Ahead: Proactive Cybersecurity in the Era of Evolving Threats (Adlumin) By leveraging advancements in artifici... read more.

  • February 07, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/27 The anatomy of a Toxic Combination of Risk (Wiz) In cloud security, the key to proactively managing your attack surface is understanding how different risk factors combine to create attack paths that would lead to significant business impact. In this blog, we’ll explore how cloud security solutions can uncover these "toxic combinations" of risk and why certain tools are better equipped to do so. https://www.wiz.io/blog/the-anatomy-of-a-toxic-combination-of-risk Staying Ahead: Proactive... read more.

  • January 31, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/20 CIS Safeguard 2.5: Allowlist Authorized Software https://www.gothamtg.com/blog/cis-safeguard-25-allowlist-authorized-software Balancing the cost and complexity of investing in your identity security strategy (Delinea) For organizations of all sizes, investing in a robust identity security strategy is crucial. The move towards platformization and smart consolidation offers a streamlined path forward, enabling businesses to manage complexities more effectively while aligning with enterprise pr... read more.

  • January 24, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/13 Understanding Indicators of Compromise and Their Role in Cybersecurity (Arctic Wolf) Indicators of Compromise continue to evolve and change as they are directly related to the constantly evolving nature of threats: malware strains appear and disappear, the expanding attack surface reveals new targets for exploit, and threat actors continue to shift their signatures in attempts to avoid detection. https://arcticwolf.com/resources/blog/understanding-indicators-of-compromise-and-their-role-in-cy... read more.

  • January 17, 2025

By Eric Corcoran, Posted in Technology Week in Review

Thursday 1/2 How SASE Addresses Enterprise Network Challenges (Check Point) Organizations implementing SASE have reported improved operational efficiency, with streamlined management and reduced complexity leading to better resource allocation and faster response times to security incidents. https://blog.checkpoint.com/harmony-sase/how-sase-addresses-enterprise-network-challenges/ Citrix Secure Private Access delivers ZTNA in hybrid mode (Citrix) Implementing ZTNA organization-wide is not a trivial und... read more.

  • January 10, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/16 8 Trends Reshaping Network Security in 2025 (Palo Alto Networks) The future of network security is an exciting one, but it also comes with its challenges. As 2025 approaches, it’s critical for organizations to stay ahead of these emerging trends by building agile security strategies that are adaptable to the rapidly changing threat landscape. https://www.paloaltonetworks.com/blog/2024/12/8-trends-network-security-in-2025/ How integrated, intelligent identity security makes you more pr... read more.

  • December 20, 2024