DC: CxO, Security Boulevard - AI, Marketing, FOSS, Email, Zscaler, Tenable, Webinars (Mon. Feb 2nd AM)
Articles Posted Week: Jan. 26th, 2026 — Feb. 1st, 2026 (334/4/1)
IT News You Can Use - Full Weekly Issue - Vol 334 Issue 4
Please share this newsletter with your IT friends and colleagues!
CxO
Security Boulevard - AI
We Keep Hearing The Same Question: Morpheus (AI SOC) Vs. Traditional Soar
What Capabilities Should AI Have For Advanced Threat Detection?
Marketing
FOSS
Email
Zscaler News
Zscaler: Enterprise AI Systems Can Be Breached In Under 2 Hours
Beyond The Crown Jewel Fallacy: Making Segmentation Work For Your Business
Tenable News
Organizations are grappling with virtualization dilemmas: expensive lock-in, dual-stack operations for VMs and containers, rising lifecycle overhead, and uncertain migration paths. Register
CxO
10 Ways To Grow As An IT Leader In 2026
IT leaders are looking to develop their profiles, perspectives, and prospects to better helm IT this year. From enhancing your executive presence to becoming more empathetic, here’s how....more
3 Decisions CISOs Need To Make To Prevent Downtime Risk In 2026
Beyond the direct impact of cyberattacks, enterprises suffer from a secondary but potentially even more costly risk: operational downtime, any amount of which translates into very real damage....more
CIOs Must Reclaim Agency Over Our AI Future
Big players in the AI market are eating up investments with few checks on their decision-making at the expense of other worthy IT endeavors. IT leaders can’t afford to be bystanders to whatever comes next....more
The CIO Agenda For 2026
The technology outlook for the year suggests CIOs will retain their status within the board of directors. IT chiefs have become essential for enterprise success....more
CISOs Predictions For 2026
Greater AI adoption, a rise in targeted attacks on SMEs, and preparations for the post-quantum era are some of the issues cybersecurity leaders expect to accelerate next year....more
Security Boulevard - AI
We Keep Hearing The Same Question: Morpheus (AI SOC) Vs. Traditional Soar
In 2025, we spent a lot of time with enterprise SOC teams, CISOs, and large MSSPs. Discovery calls. Technical deep dives. Evaluations and implementations. We learned what’s actually working (and what isn’t) in day-to-day operations....more
What Capabilities Should AI Have For Advanced Threat Detection?
Have you ever pondered the extent to which machine identities are secured within your organization’s cloud infrastructure?...more
In this webinar, we'll look at how modern platforms like Harness enable golden pathways, self-service infrastructure-as-code, standardized environments, and easier service discovery - all of which accelerate platform adoption and improve engineering velocity. Register
What Future Trends Will Define Agentic AI Governance
What does it take to bridge the gap between security and R&D teams when managing non-human identities in cloud environments? Non-human identities (NHIs) are pivotal in modern cybersecurity frameworks, acting as machine identities that ensure secure interaction between different technological entities....more
Marketing
Best Email Marketing Platforms For Businesses Of All Sizes (2026)
Explore Top Email Marketing Platforms for Building Scalable Campaigns, Automating Customer Journeys, and Driving Measurable Business Growth...more
FOSS
Hottest Cybersecurity Open-Source Tools Of The Month: January 2026
This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments....more
Grafana: The Comprehensive Monitoring Platform
Grafana is an open source platform designed for monitoring and observability. It enables you to query, visualise, alert on, and comprehend your metrics regardless of their storage location....more
Email
Fighting The Next Evolution Of Email Threats With Layered, AI-Driven Security
For decades, email has been the backbone of corporate communications and for precisely this reason, it remains the attacker’s preferred gateway into organisations. Phishing, Business Email Compromise (BEC), and supply chain attacks continue to increase, with adversaries using AI and compromised accounts to bypass classic protection mechanisms....more
The Best Email Encryption Software: Expert Tested
The best email encryption software can prevent hackers from scraping your emails for company contracts, financial records, and workplace credentials....more
Zscaler News
Zscaler: Enterprise AI Systems Can Be Breached In Under 2 Hours
As reported by Tech Radar, new research from Zscaler highlights critical security vulnerabilities in enterprise AI systems, warning that many can be breached in less than two hours, leading to rapid data loss....more
Accelerating AI Initiatives With Zero Trust
Act Fast. Stay Secure. This is the critical mission for enterprise organizations in the rapidly evolving world of AI. Today we launch exciting new innovations to Zscaler’s AI security portfolio, paving the way for accelerating AI initiatives with confidence....more
Beyond The Crown Jewel Fallacy: Making Segmentation Work For Your Business
In Zero Trust conversations, there’s a familiar story many organizations tell themselves....more
Tenable News
Tenable Tackles AI Governance, Shadow AI Risks, Data Exposure
The Tenable One AI Exposure add-on discovers unsanctioned AI use in the organization and enforces policy compliance with approved tools....more
In today's environment, speed and execution separate winners from the rest. The trends we've tracked for years-AI and generative AI, cloud maturity, data modernization, and true digital leadership-are no longer emerging; they're table stakes for competitive advantage. Register
Upcoming Webinars
Tuesday, February 3rd, 2026
The Compliance Paradox: Why More Rules Mean Faster Releases (Feb. 3rd)- 1:00 PM to 2:00 PM ET
The Brass Ring of AppSec: Is AI Finally Making DAST to SAST Correlation Possible? (Feb. 3rd)- 11:00 AM to 12:00 PM ET
TechTalk Tuesday (Feb. 3rd)- 2:00 PM to 4:00 PM ET
TechTalk: Sitecore in the Stadium (Moda Center, Portland, OR) (Feb. 3rd)- 6:45 PM to 8:00 PM Game time
Wednesday, February 4th, 2026
AI Meets Storage: Comparing On-Prem, Cloud, and Hybrid Architectures Across the AI Lifecycle (Feb. 4th)- 1:00 PM to 2:00 PM
Solving Virtualization Dilemmas with Dell, Red Hat and Intel (Feb. 4th)- 11:00 AM to 12:00 PM
Thursday, February 5th, 2026
Making Software Delivery Resilient with Autonomous Recovery(Feb. 5th)- 1:00 PM to 2:00 PM ET
Attack Surface Management: Discovering and Securing Unknown (Feb. 5th)- 1:00 PM to 2:00 PM ET
Technology Executive Dinner - Chicago, IL (Feb. 5th)- 6:00 PM to 8:30 PM CT
Deepfake Training: Empowering Your Users to Recognize What AI Can Fake (Feb. 5th)- 1:00 PM to 2:00 PM ET
About Data Connectors
Since 1999, Data Connectors has been facilitating relationships between senior executives who are looking for solutions and the vendors who provide them. Our community encompasses more than 650,000 professionals.
We produce this daily curation of industry news and events as a value to our community for free.
Upgrade to a Paid substack subscription to receive additional valuable posts. You will be supporting the community and will allow us to produce this service and to develop additional services.




