Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/3 New Proofpoint Innovations That Help You to Defend Data and Mitigate Insider Risks (Proofpoint) Keeping data safe is more than just enforcing policies in a reactive manner—it’s about knowing where the risks come from and being proactive. Proofpoint Data Security helps organizations discover, classify and protect data. https://www.proofpoint.com/us/blog/information-protection/innovations-to-data-security-insider-risk-mitigation Identity Verification Trends in 2025 … and Beyo... read more.

  • March 07, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/24 2025 State of Code Security: Key Trends and Risks (Wiz) The data is clear: unmanaged risks in code and version control systems present significant challenges for the modern enterprise. From alarming levels of secrets exposure to insecure CI/CD workflows, these vulnerabilities jeopardize production environments.  https://www.wiz.io/blog/state-of-code-security-report-2025 Proofpoint Research: 2024 Account Takeover Statistics (Proofpoint) Attackers’ focus on compromising accounts is... read more.

  • February 28, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/17 The Role of Runtime Security in Cloud Environments (Wiz) As cloud adoption accelerates, security teams must protect dynamic, cloud-native environments that include containers, serverless functions, and virtual machines (VMs). Runtime cloud security refers to the continuous monitoring and protection of workloads while they are actively running in production environments.  https://www.wiz.io/blog/the-role-of-runtime-security-in-cloud-environments Why Data Tiering is Critical for Modern Se... read more.

  • February 21, 2025

By Josue Molina, Posted in Infrastructure, Virtualization

MSIX is a Windows app package format that was released in 2018 to simplify app deployment and management. Although not widely used at first, MSIX has gained traction in recent years. For example, the Microsoft Teams VDI installation now uses MSIX for deployment, and there are several defined customer journeys. With that in mind, I thought it would be good to share what's contained within an MSIX package. Inside the MSIX package you’ll find the following folders and files: AppxMetadata: This... read more.

  • February 19, 2025

By Josue Molina, Posted in Infrastructure, Virtualization

With Windows 10 reaching end of life in October, new opportunities emerge, such as trying MSIX app attach for application delivery. MSIX app attach is a Microsoft packaging technology used to deliver apps to virtual desktops and sessions without requiring installation. The app simply runs in a container. There are four unique phases that must be executed to attach and detach MSIX apps: Stage: This phase prepares the machine to receive and mount the MSIX app disk image Register: This phase registers the... read more.

  • February 18, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/10 AI vs. AI: What Attackers Know Could Hurt You (Abnormal Security) AI is pushing the envelope for hackers and other bad actors, but it's also giving security professionals a powerful new weapon. In 2025, the biggest threat will be to organisations that ignore the writing on the wall and continue to pour resources into solutions that are no match for AI-driven attacks. https://abnormalsecurity.com/blog/ai-vs-ai-attackers-could-hurt-you Reimagining Your SOC: Overcoming Alert Fatigue with A... read more.

  • February 14, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/3 6 building blocks of a winning identity security strategy (Delinea) Identity strategy is not just about ensuring humans and non-humans have the right access; it's also about enhancing the security mechanisms that protect sensitive information from unauthorized access and breaches. https://delinea.com/blog/6-building-blocks-of-a-winning-identity-security-strategy Tuesday 2/4 Staying Ahead: Proactive Cybersecurity in the Era of Evolving Threats (Adlumin) By leveraging advancements in artifici... read more.

  • February 07, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/27 The anatomy of a Toxic Combination of Risk (Wiz) In cloud security, the key to proactively managing your attack surface is understanding how different risk factors combine to create attack paths that would lead to significant business impact. In this blog, we’ll explore how cloud security solutions can uncover these "toxic combinations" of risk and why certain tools are better equipped to do so. https://www.wiz.io/blog/the-anatomy-of-a-toxic-combination-of-risk Staying Ahead: Proactive... read more.

  • January 31, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation Safeguarding your software ecosystem is crucial, and ensuring only authorized libraries are used is like assembling a trusted team of superheroes. CIS Safeguard 2.6: Allowlist Authorized Libraries epitomizes the meticulous selection process of the Avengers’ roster in the Marvel Universe. The Avengers' Assembly Just as Nick Fury carefully selects each Avenger based on their abilities and trustworthine... read more.

  • January 28, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/20 CIS Safeguard 2.5: Allowlist Authorized Software https://www.gothamtg.com/blog/cis-safeguard-25-allowlist-authorized-software Balancing the cost and complexity of investing in your identity security strategy (Delinea) For organizations of all sizes, investing in a robust identity security strategy is crucial. The move towards platformization and smart consolidation offers a streamlined path forward, enabling businesses to manage complexities more effectively while aligning with enterprise pr... read more.

  • January 24, 2025