DC: Popular Vendor Articles Posted Week of January 26th, 2026
Volume 334 Issue 3 - IT News You Can Use
IT News You Can Use
We promote many IT Vendor articles in our daily and weekly newsletters which have 250,000+ subscribers. We track which articles and webinars are the most clicked on. These are the most clicked on vendor IT articles, group by vendor.
Full issue is here: Volume 334, Issue 3
Red Hat News
Extend And Enhance Your Red Hat Enterprise Linux Support: A Guide To Lifecycle Add-Ons
Red Hat, Wednesday, January 21st, 2026
Red Hat Enterprise Linux (RHEL) is the foundation for countless mission-critical deployments. But what happens when your business needs to stay on a specific version of RHEL longer than the standard lifecycle, or requires enhanced security beyond what the already-robust subscription delivers by default? That’s where RHEL lifecycle add-ons come in....more
AI Quickstarts: An Easy And Practical Way To Get Started With Red Hat AI
Red Hat, Tuesday, January 20th, 2026
Ready to accelerate your AI journey? AI quickstarts are officially here! AI quickstarts are a new catalog of ready-to-run, industry-specific use cases that put the power of open source AI directly into your hands. These are a playground you can use to master Red Hat AI and sharpen the skills needed to take your AI ideas from experimentation to production....more
Friday Five - January 23, 2026
Red Hat, Friday, January 23rd, 2026
The Friday Five is a weekly Red Hat blog post with 5 of the week’s top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye....more
New Observability Features In Red Hat OpenShift 4.20 And Red Hat Advanced Cluster Management 2.15
Red Hat, Thursday, January 22nd, 2026
The latest release of the Red Hat OpenShift cluster observability operator 1.3 introduces observability signal correlation, incident detection, application performance monitoring (APM) dashboard, and more....more
Event-Driven Ansible: Simplified Event Routing With Event Streams
Red Hat, Tuesday, January 20th, 2026
The systems running an organization’s infrastructure and applications are interconnected, creating an environment of controlled chaos where events in one area can ripple unpredictably through others....more
Understanding Security Embargoes At Red Hat
Red Hat, Thursday, January 22nd, 2026
Within Red Hat’s Coordinated Vulnerability Disclosure (CVD) framework, an embargo is a strictly-defined window of time during which a security vulnerability is known only to a small group of trusted parties before being made public, including the vulnerability reporter and the relevant upstream community and partners....more
Fortinet News
Reimagining AI From A Security Risk Into An Asset With Fortinet
Fortinet, Monday, January 19th, 2026
Enterprises that move toward broad AI adoption often discover that, in spite of various benefits, it also introduces new security challenges. At AI Field Day 7, Fortinet presented a clear assessment of those risks and demonstrated how the Fortinet Security Fabric and FortiAI Assist can support secure deployment of AI systems....more
2026 Cloud Security Report Data Reveals ‘Complexity Gap’
Fortinet, Wednesday, January 21st, 2026
As more and more enterprises catapult into an AI-powered future, cloud security is more critical than ever to an organization’s success and, perhaps even, survival. The velocity of AI adoption is fundamentally changing how cloud environments are managed and expanding the attack surface at a speed that outpaces traditional security models and teams’ ability to protect modern deployments....more
FortiSIEM 7.5 Powers the Modern SOC with Agentic AI and Data Sovereignty Compliance
Fortinet, Thursday, January 22nd, 2026
Security operations centers (SOCs) are increasingly defending against the sophistication and speed of AI-enabled attackers. At the same time, data and operational sovereignty concerns can make it difficult for multinational organizations to operate an effective centralized SOC....more
Citrix News
Security By Design, Proven By Action With Citrix NetScaler
Citrix, Wednesday, January 21st, 2026
Security is not a feature you bolt on at the end of a product roadmap. Over the last few years, we’ve all watched vulnerabilities and breaches move from occasional disruptions to near-constant headlines-whether it is widely exploited CVEs, high-profile incidents impacting core infrastructure, or vulnerabilities like React2Shell that reminded the industry how quickly seemingly isolated issues can cascade....more
ESET News
How Social Engineering Attacks Work: Psychology, Tactics, And Real Examples
ESET, Tuesday, January 20th, 2026
Social engineering attacks are one of the most effective cybersecurity threats because they exploit human psychology instead of technical vulnerabilities....more
NVIDIA News
How to Get Started With Visual Generative AI on NVIDIA RTX PCs
NVIDIA, Thursday, January 22nd, 2026
Learn how to run advanced image and video generation locally with ComfyUI and LTX-2 on RTX PCs....more
Commvault News
Protecting Truth In The Age Of Deepfake Extortion
Commvault, Tuesday, January 20th, 2026
Security operations centers (SOCs) are increasingly defending against the sophistication and speed of AI-enabled attackers. At the same time, data and operational sovereignty concerns can make it difficult for multinational organizations to operate an effective centralized SOC....more
Salesforce News
Salesforce Trusted Partners: Architects Of The Agentic Enterprise
Salesforce, Friday, January 23rd, 2026
Choosing an AI path is one of the hardest decisions a leader has to make right now, and the options can feel endless. But while the ‘how’ of AI architecture is complex by nature, searching for ‘who’ to deliver the right expertise shouldn’t be....more
Security As A Shared Responsibility Between Provider And Customer
Salesforce, Thursday, January 22nd, 2026
We follow the Shared Responsibility Model and believe security is a shared responsibility between Salesforce and its customers....more
How AI Support Keeps Humans In the Loop (HitL) for Small Business Success
Salesforce, Wednesday, January 21st, 2026
AI is helping small businesses by giving them superpowers in entirely new ways, not replacing them....more
DDN News
How to Build a NAND-Resilient AI Storage Architecture
DDN, Tuesday, January 20th, 2026
For years, all-flash became the default choice for AI storage. It simplified decisions and removed performance risk when NAND pricing was stable and supply was predictable. That environment no longer exists....more
SAP News
Why AI Without Humanity Is Incomplete
SAP, Monday, January 19th, 2026
Artificial intelligence (AI) has moved far beyond experimentation. It is already reshaping how industries operate, how economies evolve, and how people experience work....more
OneTrust News
The 5 Trends Shaping Global Privacy And Enforcement In 2026
OneTrust, Thursday, January 22nd, 2026
What key regulatory privacy and enforcement trends will shape governance, accountability, and long-term business resilience....more
Sophos News
Grupo NGO Gains 24/7 Security Visibility Without Expanding Its IT Team
Sophos, Monday, January 19th, 2026
Grupo NGO is a diversified business group based in Asuncion, Paraguay, with operations across appliance import and distribution, retail, livestock farming, real estate, and hospitality....more
Okta News
Beyond The Login: Securing Identity In The Age Of AI Agents
Okta, Wednesday, January 21st, 2026
In my role as a Senior Corporate Customer Account Executive at Okta, I spend my days managing relationships. While forecasting deals and territory planning are part of the job, the core of what I do is listening. I manage a book of business where customers have already invested with us, and my goal is to ensure they are getting value and solving critical business problems....more
Digital Proof Of Employment: A New Foundation For Workforce Trust
Okta, Friday, January 23rd, 2026
For today’s enterprises, some of the highest risk moments don’t happen during login, they happen when someone needs help - especially with the rise of AI tools that clone voices, generate fake identities, and create convincing phishing emails....more
Introducing The Okta MCP Server: Securely Interact With Your Okta Org Using Natural Languages
Okta, Friday, January 23rd, 2026
Introducing the Okta MCP Server: Securely interact with your Okta org using natural languages...more
Outpacing AI-Driven Attacks With Integrated Security
Okta, Friday, January 23rd, 2026
As AI-powered attacks grow faster and more sophisticated, security teams can no longer rely on siloed tools or static controls. Modern threats move across identities, endpoints, network traffic, and cloud environments in seconds, demanding a security approach that’s just as dynamic....more
Phishing Kits Adapt To The Script Of Callers
Okta, Thursday, January 22nd, 2026
Okta Threat Intelligence has detected and dissected multiple custom phishing kits that have evolved to meet the specific needs of voice-based social engineers (’callers’) in vishing campaigns....more
Work Safer And Faster With Device-Bound Single Sign-On
Okta, Tuesday, January 20th, 2026
Employees expect secure, seamless access to the apps and tools that power their work, wherever they are and whenever they need them. But one thing is clear: traditional single sign-on (SSO) and multi-factor authentication (MFA) alone aren’t enough....more
CrowdStrike News
Small Devices, Big Risk: Usb Drives Threaten Enterprise Security
CrowdStrike, Wednesday, January 21st, 2026
How CrowdStrike protects data going out, and threats coming in, across removable media....more
Check Point News
Voidlink Signals The Start Of A New Era In AI-Generated Malware
Check Point, Monday, January 19th, 2026
Artificial intelligence is rapidly reshaping how organizations operate, innovate, and compete. But as AI becomes more powerful, it is also changing how cyber threats are created....more
Attackers Continue To Target Trusted Collaboration Platforms: 12,000+ Emails Target Teams Users
Check Point, Thursday, January 22nd, 2026
This report describes a phishing campaign in which attackers abuse Microsoft Teams functionality to distribute phishing content that appears to originate from legitimate Microsoft services. The attack leverages guest invitations and phishing-themed team names to impersonate billing and subscription notifications, encouraging victims to contact a fraudulent support phone number....more
Why Exposure Management Is Becoming A Security Imperative
Check Point, Wednesday, January 21st, 2026
Of course, organizations see risk. It’s just that they struggle to turn insight into timely, safe action. That gap is why exposure management has emerged, and also why it is now becoming a foundational security discipline....more
About Data Connectors
Since 1999, Data Connectors has been facilitating relationships between senior executives who are looking for solutions and the vendors who provide them. Our community encompasses more than 650,000 professionals.
We produce this daily curation of industry news and events as a value to our community for free.
Upgrade to a Paid substack subscription to receive additional valuable posts. You will be supporting the community and will allow us to produce this service and to develop additional services.

