This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On December 20, 2024

Monday 12/16

8 Trends Reshaping Network Security in 2025 (Palo Alto Networks)

The future of network security is an exciting one, but it also comes with its challenges. As 2025 approaches, it’s critical for organizations to stay ahead of these emerging trends by building agile security strategies that are adaptable to the rapidly changing threat landscape.

https://www.paloaltonetworks.com/blog/2024/12/8-trends-network-security-in-2025/

How integrated, intelligent identity security makes you more productive (Delinea)

While automation and ease-of-use are key to modern identity security, the true game-changers are integration and intelligence. Because all identity security solutions on the Delinea Platform share a central data model and architecture, only Delinea can make this possible.

https://delinea.com/blog/how-integrated-intelligent-identity-security-improves-productivity

Tuesday 12/17

CIS Safeguard 1.3: Utilize an Active Discovery Tool

https://www.gothamtg.com/blog/cis-safeguard-13-utilize-an-active-discovery-tool

Citrix strengthens zero trust security posture with strategic acquisitions of deviceTRUST and Strong Network (Citrix)

By integrating these advanced security technologies, Citrix aims to simplify the management of complex hybrid environments, ensure secure access for developers to critical cloud resources, and ultimately reduce the risk of data loss for its customers.

https://www.citrix.com/blogs/2024/12/10/citrix-acquires-devicetrust-and-strong-network/

Identity Evolved: The Rise of Multi-Factor Verification (HYPR)

Just as MFA arose to fight phishing and password attacks, multi-factor verification has emerged to combat social engineering and other modern identity threats. Learn all about MFV.

https://blog.hypr.com/the-rise-of-multi-factor-verification

Wednesday 12/18

Arctic Wolf and BlackBerry Announce Acquisition Agreement for Cylance (Arctic Wolf)

Cylance is the pioneer of AI-based endpoint protection trusted by thousands of organizations around the world. With this acquisition, Arctic Wolf ushers in a new era of simplicity, flexibility, and outcomes to the endpoint security market, delivering the security operations results customers have been asking for.

https://arcticwolf.com/resources/press-releases/arctic-wolf-and-blackberry-announce-acquisition-agreement-for-cylance/

How SASE Addresses Enterprise Network Challenges (Check Point)

Harmony SASE from Check Point combines security, flexibility, and performance in a unified platform. By integrating essential security and networking functions, Harmony SASE simplifies management, enhances visibility, and strengthens your organization’s security posture.

https://blog.checkpoint.com/harmony-sase/how-sase-addresses-enterprise-network-challenges/

Thursday 12/19

Discover Every Identity to Manage Cybersecurity Risk Effectively (CyberArk)

Organizations are facing rapidly changing new environments and exponentially more identities. To put this in perspective, 50% of companies expect the number of identities—human and machine—to grow by 3x in the next year alone.

https://www.cyberark.com/resources/blog/discover-every-identity-to-manage-cybersecurity-risk-effectively

Protecting Your Hybrid Cloud: The Future of Cloud Security in 2025 and Beyond (Darktrace)

As organizations continue to transition workloads and sensitive data to cloud environments, the complexity of securing distributed infrastructures grows. In 2025, cloud security will need to address increasingly sophisticated threats with innovative approaches to ensure resilience and trust.

https://darktrace.com/blog/protecting-your-hybrid-cloud-the-future-of-cloud-security-in-2025-and-beyond

Friday 12/20

Technically Speaking on Pure Fusion (Pure Storage)

Now part of the Purity operating system, Pure Fusion helps solve common problems storage administrators face by simplifying fleet management and provisioning.

https://blog.purestorage.com/purely-technical/technically-speaking-on-pure-fusion/

The many ways to obtain credentials in AWS (Wiz)

Dive into the complexities of AWS IAM credentials and uncover how defenders can stay ahead with in-depth knowledge of SDK behaviors and service-specific mechanisms.

https://www.wiz.io/blog/the-many-ways-to-obtain-credentials-in-aws