This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On March 07, 2025

Monday 3/3

New Proofpoint Innovations That Help You to Defend Data and Mitigate Insider Risks (Proofpoint)

Keeping data safe is more than just enforcing policies in a reactive manner—it’s about knowing where the risks come from and being proactive. Proofpoint Data Security helps organizations discover, classify and protect data.

https://www.proofpoint.com/us/blog/information-protection/innovations-to-data-security-insider-risk-mitigation

Identity Verification Trends in 2025 … and Beyond (Entrust)

Identity verification, or IDV, is increasingly important to securing our interactions and transactions, both online and offline. Specific to the digital universe, IDV helps ensure that the individual presenting an identity credential is the owner of that credential and is a live person that is present while conducting a digital interaction.

https://www.entrust.com/blog/2025/02/identity-verification-trends-in-2025-and-beyond

Wednesday 3/5

Modern Storage Meets Cyber Resilience: The Rubrik and Pure Storage Solution Architecture for Unstructured Data (Rubrik)

Pure Storage and Rubrik are coming together to enable organizations to take their unstructured data—regardless of volume—and unlock its potential while remaining cyber resilient.

https://www.rubrik.com/blog/technology/25/3/modern-storage-meets-cyber-resilience-the-rubrik-and-pure-storage-solution-architecture-for-unstructured-data

CrowdStrike Extends Real-Time Protection for Microsoft Entra ID to Take on Identity-Based Attacks (CrowdStrike)

By integrating real-time threat prevention directly into Entra ID authentication flows, CrowdStrike helps organizations thwart identity-based attacks with precision.

https://www.crowdstrike.com/en-us/blog/crowdstrike-extends-real-time-protection-for-entra-id/

Thursday 3/6

How To Better Secure Active Directory (Arctic Wolf)

Hardening Active Directory against these security risks is an important part of identity security within an organization. Not taking measures to secure Active Directory could lead to a threat actor gaining access and conducting credential theft, privilege escalation, data exfiltration, or even launching a more sophisticated attack such as ransomware.

https://arcticwolf.com/resources/blog/how-to-better-secure-active-directory/

Five Reasons Retail Chains Can’t Ignore SASE (Check Point)

Retailers are highly attractive targets for cyber criminals, as they process high volumes of valuable customer data and continue to invest in new digital technologies, resulting in a growing attack surface.

https://blog.checkpoint.com/harmony-sase/five-reasons-retail-chains-cant-ignore-sase/

Hiding in Plain Sight: How Attackers Use PDF Annotations to Mask Malicious QR Codes (Abnormal Security)

Attackers are exploiting PDF annotations to disguise phishing QR codes, bypassing security and deceiving users. Learn how this sophisticated threat works.

https://abnormalsecurity.com/blog/pdf-annotations-mask-malicious-qr-codes

Friday 3/7

The significance of PCI-DSS 4.x in identity security compliance (Delinea)

PCI-DSS 4.0.1 includes improved explanations for critical requirements such as multi-factor authentication (MFA), access controls, and secure configurations. Updated testing procedures provide more precise methods to verify compliance with identity security requirements.

https://delinea.com/blog/pci-dss-4.x-and-identity-security-compliance

2025 Cybersecurity Trends (And How They’ll Impact You) (Axonius)

Between generative AI, expanding attack surfaces, and the explosion of machine identities, security and risk management (SRM) leaders face a demanding year ahead. In these uncertain times, cybersecurity teams need clarity on where to direct their efforts.

https://www.axonius.com/blog/2025-cybersecurity-trends