DC: CxO Podcasts, AI, DR, Salesforce, Red Hat, OneTrust, Check Point, Trend Micro, Webinars (Fri. Oct 3rd AM)
Articles Posted Week of Sept. 22nd, 2025 — Sept. 28th, 2025 (330/4/9)
IT News You Can Use - Full Weekly Issue - Vol 330 Issue 4
Please share this newsletter with your IT friends and colleagues!
CxO Podcasts
On theCUBE Pod: Nvidia Bets On Intel, CUDA’s Moat Widens And AI Factories Reshape Data Centers
Why AI Upskilling Fails, And How Tech Leaders Are Fixing It (27:16)
AI
DR
Salesforce News
Red Hat News
OneTrust News
Check Point News
Trend Micro News
Domino Effect: How One Vendor’s AI App Breach Toppled Giants
AI-Powered App Exposes User Data, Creates Risk Of Supply Chain Attacks
Every day, organizations are at risk of a cyberattack by financially motivated threat actors as well as state sponsored cyber spies. But just who are the cyber attackers behind the endless wave of attack campaigns and what are their underlying missions? Register
CxO Podcasts
On theCUBE Pod: Nvidia Bets On Intel, CUDA’s Moat Widens And AI Factories Reshape Data Centers
Powered by artificial intelligence, AI factories are fast becoming the blueprint for packaging compute, interconnects and software into production systems that churn out large-scale intelligence across data centers, PCs and the edge. What once looked like a parts list is coalescing into tightly integrated pipelines optimized for utilization, throughput and “tokens per watt.”...more
Why AI Upskilling Fails, And How Tech Leaders Are Fixing It (27:16)
Each month, hosts Keith Shaw and Matt Egan are joined by a top-tier panel of editors from Foundry’s global team to discuss hot technology topics and give insights from IT buyers in markets around the world....more
How Agentic AI Is Changing The SOC
In this Help Net Security video, David Norlin, CTO of Lumifi, explores the role of agentic AI in the security operations center (SOC)....more
AI
AI Is Rewriting The Rules Of Cyber Defense
Enterprise security teams are underprepared to detect new, adaptive AI-powered threats. The study, published by Lenovo, surveyed 600 IT leaders across major markets and shows widespread concern about external and internal risks, along with low confidence in current defenses....more
Why Dataops Is Critical To Successfully Scaling AI
AI projects often fail to scale due to poor data quality and siloed pipelines. Learn how DataOps provides the governance, automation, and real-time capabilities needed to deliver reliable AI at enterprise scale....more
11 Real-World Agentic AI Examples And Use Cases
AI that doesn’t just follow instructions but figures out how to get things done -- that’s the promise of agentic AI, an emerging approach that’s already changing some sectors....more
DR
Business Continuity Keeps Albany District Running No Matter What
The City School District of Albany develops a plan to restore operations in the face of disruption....more
The Long Hours Of Lost Data
Following a successful cyberattack, we have found that substantial amounts of data can become exposed or irretrievable. Our research indicates that businesses can lose many hours or even days’ worth of transactions following such an attack - the Recovery Point Objective, or RPO....more
Is your organization struggling to deliver faster, better services across IT and beyond? Join us for an exclusive session with WestEd IT leaders Kierstin McDowell and Larry Rosenberg as they share how they've transformed their IT Service and Enterprise Service Management (ESM) processes. Register
Salesforce News
How Do You Know If Your AI Agent Is Doing A Good Job?
Evaluation tools for agents are still an emerging technology, but there are plenty of ways to assess your agent’s performance today....more
Red Hat News
Friday Five - September 5, 2025
The Friday Five is a weekly Red Hat blog post with 5 of the week’s top news items and ideas from or about Red Hat and the technology industry. Consider it your we ekly digest of things that caught our eye....more
Building An Adaptable Enterprise: A Guide To AI Readiness
The speed and diversity of today’s technological advances create a constant challenge for IT leaders. You simply cannot afford to wait and see which advances fall by the wayside or end up worthy of adoption....more
Maximize Your Openshift Investment: 6 Reasons To Upgrade To OpenShift Platform Plus
If you’re currently using Red Hat OpenShift Container Platform, you already know it provides a solid foundation for containerized applications. So why upgrade to Red Hat OpenShift Platform Plus?...more
OneTrust News
Who Owns Risk In The Enterprise?
CISOs, GRC, and risk leaders must collaborate to ensure risk management isn’t overlooked...more
Check Point News
How To Defend Against Credential Attacks With A Hybrid Mesh Architecture
Credential-based attacks have reached epidemic levels. The 2025 Verizon Data Breach Investigations Report (DBIR) underscores the trend: 22% of breaches now start with compromised credentials, while Check Point External Risk Management found that leaked credential volumes surged 160% year-over-year....more
Trend Micro News
Domino Effect: How One Vendor’s AI App Breach Toppled Giants
A single AI chatbot breach at Salesloft-Drift exposed data from 700+ companies, including security leaders. The attack shows how AI integrations expand risk, and why controls like IP allow-listing, token security, and monitoring are critical....more
AI-Powered App Exposes User Data, Creates Risk Of Supply Chain Attacks
Trend Research’s analysis of Wondershare RepairIt reveals how the AI-driven app exposed sensitive user data due to unsecure cloud storage practices and hardcoded credentials, creating risks of model tampering and supply chain attacks....more
CNAPP Is The Solution To Multi-Cloud Flexibility
Cloud-native application protection platform (CNAPP) not only helps organizations protect, but offers the flexibility of multi-cloud....more
Every October, organizations across the country recognize Cybersecurity Awareness Month— but too often, the effort becomes a box-checking exercise. Employees skim a few slides, click through an online module, and move on without truly changing their behaviors. At DC Edge, we believe awareness should be engaging, memorable, and impactful.
That’s why we’ve partnered with an industry leader to bring you Virtual Cyber Escape Rooms—a fun, interactive way to teach critical cybersecurity skills. Instead of passively watching or reading, your team steps into a high-energy challenge where they must collaborate, solve puzzles, and outsmart a hacker.
Upcoming Webinars
Wednesday, Oct 8, 2025 ET
Thursday, Oct 9, 2025 ET
Thursday, Oct 16, 2025 ET
Tuesday, Oct 21, 2025 ET
Wednesday, Oct 22, 2025 ET
About Data Connectors
Since 1999, Data Connectors has been facilitating relationships between senior executives who are looking for solutions and the vendors who provide them. Our community encompasses more than 650,000 professionals.
We produce this daily curation of industry news and events as a value to our community for free.
Upgrade to a Paid substack subscription to receive additional valuable posts. You will be supporting the community and will allow us to produce this service and to develop additional services.




