This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On March 21, 2025

Monday 3/17

Beyond the Cloud | How Edge Computing is Unlocking IoT’s Full Potential (Check Point)

As more devices come online, relying solely on cloud computing can lead to slow response times, high bandwidth costs and security risks. The traditional cloud-based infrastructure struggles to keep up with the demands of real-time data processing, low latency, and proactive, preventative security.

https://blog.checkpoint.com/innovation/how-edge-computing-is-unlocking-iots-full-potential/

The Urgent Reality of Machine Identity Security in 2025 (Cyberark)

Machine identities are experiencing exponential growth, with 79% of organizations predicting increases over the next year and 16% of those expecting radical growth of 50 to 150%. Unfortunately, this growth comes with amplified risks.

https://www.cyberark.com/resources/blog/the-urgent-reality-of-machine-identity-security-in-2025

Tuesday 3/18

Survey findings: AI Cyber Threats are a Reality, the People are Acting Now (Darktrace)

As attackers harness AI to automate and scale their operations, security teams must adapt just as quickly. Organizations that fail to prioritize AI-specific security measures risk falling behind, making proactive defense strategies more critical than ever.

https://darktrace.com/blog/survey-findings-ai-cyber-threats-are-a-reality-the-people-are-acting-now

Identity-Centric Zero Trust (Delinea)

Since the advent of Zero Trust, many organizations have chosen to begin their journeys with a network-centric approach, employing software defined perimeters and micro-segmentation strategies for their IT architecture and workflows. Identity-Centric Zero Trust ensures that both human and non-human entities, along with their access and privileges, are limited and continually protected.

https://delinea.com/blog/identity-centric-zero-trust

Wednesday 3/19

What is Identity Proofing? (HYPR)

Threat actors frequently target weak links in the authentication chain, including account recovery and day-to-day activities. Modern identity proofing should be user journey-oriented and adaptable beyond initial onboarding to ensure the highest continuous protection against identity fraud.

https://blog.hypr.com/what-is-identity-proofing

Ditch the Checkboxes: A Guide to Risk-Based Vulnerability Management (Axonius)

Security teams that successfully shift to risk-based vulnerability management do more than scan and patch. They align security priorities with business needs. The most effective teams move beyond compliance checkboxes and build security programs around context, automation, and asset intelligence.

https://www.axonius.com/blog/guide-risk-based-vulnerability-management

Thursday 3/20

Moving from Multiple Clouds to Multicloud: 6 Steps to Creating a Modern Environment (Nutanix)

Transitioning from dozens of siloed environments to a single standardized setup takes time. This process will require gradual steps, where you first consolidate a set of environments and tools into a smaller pool before eventually narrowing them down to a single, unified standard. It’s important to adopt a phased approach to this process.

https://www.nutanix.com/blog/moving-from-multiple-clouds-to-multicloud

 

Friday 3/21

Defensive AI: How Abnormal Prevents AI-Powered Email Threats (Abnormal Security)

AI-powered email threats are evolving, and traditional security measures can’t keep up. With the rising risks of advanced email attacks, organizations need proactive, AI-driven defenses to stay protected.

https://abnormalsecurity.com/blog/defensive-ai-prevent-ai-email-threats

An Overview of Microsoft 365 Security Best Practices (Adlumin)

Microsoft 365 offers built-in security features that aim to protect organizations from various cybersecurity threats. However, in today’s complex threat landscape, relying only on the built-in security of M365 may not be enough. 

https://adlumin.com/post/an-overview-of-microsoft-365-security-best-practices/