DC: CxO, Security Boulevard - NHI, Cloud, IoT, Backup, Google, Bitdefender, Sophos, Webinars (Tue. Feb 3rd AM)
Articles Posted Week: Jan. 26th, 2026 — Feb. 1st, 2026 (334/4/3)
IT News You Can Use - Full Weekly Issue - Vol 334 Issue 4
Please share this newsletter with your IT friends and colleagues!
CxO
Human Risk Management: CISOs’ Solution To The Security Awareness Training Paradox
How Enterprise CIOs Can Scale AI Coding Without Losing Control
Security Boulevard - NHI
Cloud
IoT
Backup
Google News
Project Genie: Experimenting With Infinite, Interactive Worlds
Find Out What’s New In The Gemini App In January’s Gemini Drop.
Bitdefender News
Breach At Tinder, Hinge And OkCupid Parent Match Group Exposes User Data
Android Trojan Campaign Uses Hugging Face Hosting For RAT Payload Delivery
Sophos News
Beyond MFA: Building True Resilience Against Identity-Based Attacks
Eeny, Meeny, Miny, Moe? How Ransomware Operators Choose Victims
Generative AI And Cybersecurity: What Sophos Experts Expect In 2026
Join Sitecore for an unforgettable evening at the Chicago Bulls vs Charlotte Hornets game. You'll enjoy the game from a private suite at the United Center - networking with fellow senior executives, Sitecore leaders, and industry peers over food, drinks, and great basketball. Register
CxO
Human Risk Management: CISOs’ Solution To The Security Awareness Training Paradox
Despite increasing investment, security awareness training continues to deliver marginal benefits. With a focus on actions over knowledge, AI-based HRM can personalize training to improve employee behavior - and ROI....more
Overcoming AI Fatigue
AI is now everywhere within enterprises. Many CISOs I speak with feel stuck between wanting to move forward and not knowing where to begin. The fear of getting both security’s use of AI and securing AI within the organization wrong often stops their process before it begins....more
How Enterprise CIOs Can Scale AI Coding Without Losing Control
AI coding can make teams dramatically faster - but only if CIOs put smart guardrails in place so speed doesn’t turn into risk....more
5 Key Questions About The CIO AI Agenda In 2026
Many CIOs anticipated the AI conversation evolving from experimentation to financial responsibility. The shift is now taking place....more
The Stakes Rise For The CIO Role In 2026
Can the CIO job get much bigger? Yes. Pressure is rising for top CIOs as the role expands. Here’s what’s getting harder in 2026 -- and the few things that may be easier....more
Security Boulevard - NHI
How Do NHIs Deliver Value In Digital Security Landscapes?
The rapid expansion of cloud environments has ushered in a powerful yet complex challenge: managing digital identities that aren’t tied to any one person. These Non-Human Identities (NHIs), which often take the form of machine identities, are integral to a secure and efficient ecosystem. But what value do they truly deliver, and how can organizations maximize their potential?...more
How Does Agentic AI Reduce Risks In Digital Environments?
Where businesses increasingly shift operations to the cloud, how can they ensure robust security while managing machine identities?...more
How Secure Are Secrets Vaults In Cloud Environments
Machine identities have emerged as critical components that require immediate attention and robust management. Where organizations increasingly rely on digital transformations and cloud environments, the security of Non-Human Identities (NHIs) and their secrets vaults cannot be overstated....more
What Are The Best Practices For NHI Management
Imagine you’re managing a bustling airport, where travelers are constantly arriving and departing. Now, replace those travelers with machine identities, and you’re picturing the modern cloud environment....more
Cloud
Report: Cloud Complexity Outpaces Security Defenses As Multi-Cloud Becomes The Norm
The 2026 Cloud Security Report from Fortinet finds that cloud security teams are struggling less with whether they can secure the cloud and more with whether they can keep up with it....more
Join us for your chance to finally visit the exclusive Soho House in your city. These exclusive members-only clubs throughout the world are known for playing host to celebrities, executives, artists and the jet set crowd - and notorious for the difficulty in gaining access. Soho House lounges and event spaces are designed for the ultimate in luxury networking, created around the concept of fostering professional connections in a convivial and intimate environment. Register
IoT
7 Top Edge Computing Solutions For IoT Devices
Edge computing lets IoT devices manage data faster and more efficiently. It is an important innovation that corresponds with the growth of IoT device use and the data challenges that come along with it....more
Backup
8 Ways To Use AI For Data Backup
Recognize AI-based data backups as a strategic imperative that propels your IT team forward by protecting critical business assets while providing compliance and cost optimization....more
Google News
Project Genie: Experimenting With Infinite, Interactive Worlds
Google AI Ultra subscribers in the U.S. can try out Project Genie, an experimental research prototype that lets you create and explore worlds....more
Find Out What’s New In The Gemini App In January’s Gemini Drop.
Gemini Drops are our regular update on what’s new in the Gemini app. Check out how Gemini app got better this month......more
New Developer Tools For Google AI Pro And Ultra Subscribers
We’re integrating Google Developer Program premium benefits - including Google Cloud credits - directly into Google AI Pro and Google AI Ultra subscriptions to help you build and scale....more
Bitdefender News
Breach At Tinder, Hinge And OkCupid Parent Match Group Exposes User Data
Match Group, the parent company of several widely used dating platforms including Tinder, Hinge, OkCupid, Match.com and Meetic, has acknowledged it suffered a cybersecurity incident after criminals claimed to possess internal data tied to multiple services....more
Hugging Face Repositories Used To Spread Android RAT
Attackers are always searching for trustworthy domains they can use to host their files. These domains don’t usually generate suspicious traffic, so criminals know they can use them to launch attacks that are harder to intercept....more
Android Trojan Campaign Uses Hugging Face Hosting For RAT Payload Delivery
What makes this campaign particularly interesting is the attackers’ use of Hugging Face to host malicious payloads, and the scale at which new samples are deployed....more
Sophos News
Beyond MFA: Building True Resilience Against Identity-Based Attacks
Multi-factor authentication (MFA) remains a cornerstone of cybersecurity, but attackers have learned find workarounds....more
Eeny, Meeny, Miny, Moe? How Ransomware Operators Choose Victims
Most ransomware attacks are opportunistic, not targeted at a specific sector or region...more
Generative AI And Cybersecurity: What Sophos Experts Expect In 2026
AI has dominated cybersecurity headlines for years, but as we enter 2026, the conversation is shifting from hype to hard realities. Across incident response, threat intelligence, and security operations, Sophos experts see clearer signals of where AI is truly making an impact. For IT teams already stretched thin, this isn’t theoretical - it’s reshaping daily decisions....more
In this talk, we will retrace that investigation. Starting from live exploitation artifacts, we will show how we correlated repositories across multiple tenants, fingerprinted vulnerable internet-facing servers, and pieced together the attack chain. Register
Upcoming Webinars
Wednesday, February 4th, 2026
AI Meets Storage: Comparing On-Prem, Cloud, and Hybrid Architectures Across the AI Lifecycle (Feb. 4th)- 1:00 PM to 2:00 PM
Solving Virtualization Dilemmas with Dell, Red Hat and Intel (Feb. 4th)- 11:00 AM to 12:00 PM
Thursday, February 5th, 2026
Making Software Delivery Resilient with Autonomous Recovery(Feb. 5th)- 1:00 PM to 2:00 PM ET
Attack Surface Management: Discovering and Securing Unknown (Feb. 5th)- 1:00 PM to 2:00 PM ET
Technology Executive Dinner - Chicago, IL (Feb. 5th)- 6:00 PM to 8:30 PM CT
Deepfake Training: Empowering Your Users to Recognize What AI Can Fake (Feb. 5th)- 1:00 PM to 2:00 PM ET
Tuesday, February 10th, 2026
Autonomous IT: Transforming Operations and Security in Real Time with AI (Feb. 10th)- 1:00 PM to 2:00 PM ET
ITEXPO (February 10-12) Ft. Lauderdale- 8:00 AM to 3:00 PM Thursday, Friday 12th
Autonomous IT: Transforming Operations and Security in Real Time with AI (Feb. 10th)- 1:00 PM to 2:00 PM ET
Enterprise Communications Summit @ ITEXPO (February 10-12) Ft. Lauderdale- 8:00 AM to 3:00 PM Thursday, Friday 12th
About Data Connectors
Since 1999, Data Connectors has been facilitating relationships between senior executives who are looking for solutions and the vendors who provide them. Our community encompasses more than 650,000 professionals.
We produce this daily curation of industry news and events as a value to our community for free.
Upgrade to a Paid substack subscription to receive additional valuable posts. You will be supporting the community and will allow us to produce this service and to develop additional services.




