DC: Security, Big Data, Telco, FOSS, Backup, Veeam, Fortinet, Check Point, Webinars (Wed., Sept. 3rd PM)
Articles Posted Week of Aug 25th, 2025 — Aug 31st, 2025 (329/4/6)
IT News You Can Use - Full Weekly Issue - Vol 329 Issue 4
Please share this newsletter with your IT friends and colleagues!
Security
Security Chaos Engineering: Weaponizing Chaos For Modern CISOs
How Vulnerability Management Evolves Into Exposure Management
Infostealers: The Silent Smash-and-Grab Driving Modern Cybercrime
Enterprise Security Faces New Challenge As Attackers Master Art Of Digital Impersonation
Big Data
Telco
FOSS
Backup
Veeam News
Fortinet News
How CNAPP Secures Cloud-Native Workloads - From Code to Runtime
How Fortinet AI-Driven SecOps Delivers Faster, Smarter SecOps
Fortinet Named a Leader in the 2025 Gartner Magic Quadrant for Hybrid Mesh Firewall
Check Point News
Cyber Attacks Surge Against Education Sector Ahead of Back-to-School Season
Check Point Named a Leader in the 2025 Gartner Magic Quadrant for Hybrid Mesh Firewall
In this webinar, experts will explain how to ask the questions necessary to build the incident response playbook that fits your organization, and how to test the playbook so that you know the plan is functional and effective. Register
Security
Security Chaos Engineering: Weaponizing Chaos For Modern CISOs
As cyber attackers grow more intelligent, persistent, and empowered by artificial intelligence (AI), traditional cybersecurity models, centered on static defenses and post-incident response, are proving insufficient....more
How Vulnerability Management Evolves Into Exposure Management
Today, the perimeter is everywhere and nowhere. Devices authorized and unauthorized wander in and out of your network. You subscribe to rather than install software. Half your assets live on other companies' servers, and half your workforce dials in from home....more
Infostealers: The Silent Smash-and-Grab Driving Modern Cybercrime
Competition among malware-as-a-service developers has transformed infostealers into refined, accessible tools for cybercriminals worldwide....more
AI Tools Are Making Social Engineering Attacks Even More Convincing, And I Fear That This is Only The Beginning
Wallace and Gromit meet deepfake deception in this sharp take on AI-driven scams...more
Enterprise Security Faces New Challenge As Attackers Master Art Of Digital Impersonation
Cybercriminal groups weaponize human psychology to breach networks...more
Big Data
The Data Platform Debt You Don't See Coming
Your organization has likely invested millions of dollars into a modern data stack, providing your team with powerful cloud warehouses and cutting-edge tools....more
Telco
At The Edge, Solving For Thermal And Power Efficiency is Just As Critical as Managing Bandwidth and Latency
At the edge, solving for thermal and power efficiency is just as critical as managing bandwidth and latency...more
FOSS
Is It Really Open Source? How to Tell if a Project Walks the Walk
Not all open source is created equal, argues open source advocate, Nextcloud co-founder, and FOSS Force guest writer Jos Poortvliet....more
New Research Debunks Open Source Business Model Myths
The study shatters open source business myths: COSS companies achieve 7x higher valuations, proving community and commerce aren't mutually exclusive....more
Backup
The Growing Threat of Privilege Escalation Attacks
Privilege escalation attacks have become one of the most dangerous cybersecurity threats facing organizations today. These sophisticated attacks allow threat actors to transform minor security breaches into complete network compromises, often targeting backup systems and critical infrastructure along the way....more
AI and Backup: How Backup Products Leverage AI
We look at how AI helps with backup, from AI analysis of backup jobs and their integrity through natural language support functionality to ransomware and anomaly detection...more
10-Step Guide For Testing a Backup And Recovery Plan
Failure is not an option when it comes to backing up data and recovering it if disaster strikes. Data backup testing can pinpoint potential problems in the recovery process....more
This fireside chat, featuring Unit 42 expert insights from real-world cases, will expose the true cost of cloud insecurity and how defenders can protect their cloud assets and data. We'll then reveal how Palo Alto Networks Cortex Cloud delivers comprehensive, AI-driven defense, simplifying security from development to runtime. Register
Veeam News
How to Prevent Supply Chain Ransomware Attacks
It's 2025, and SaaS and other cloud services are predominant. Organizations rely on countless suppliers, vendors, and service providers to deliver critical infrastructure, software, and services....more
Fortinet News
How CNAPP Secures Cloud-Native Workloads - From Code to Runtime
Cloud-native applications are built for speed, scale, and flexibility. However, these same qualities make them difficult to secure using traditional methods. That's because in a cloud-native architecture, workloads are ephemeral, deployments are automated, and infrastructure is defined in code. Security must be able to adapt to this reality....more
How Fortinet AI-Driven SecOps Delivers Faster, Smarter SecOps
Security teams today face a relentless surge in alerts, sophisticated threats, and operational complexity. However, most organizations rely on a patchwork of point solutions that don't communicate, creating silos and blind spots. Manual workflows slow response times. Alert fatigue sets in. And critical threats slip through the cracks....more
Fortinet Named a Leader in the 2025 Gartner Magic Quadrant for Hybrid Mesh Firewall
Fortinet announced it has been recognized as a Leader in the 2025 Gartner Magic Quadrant for Hybrid Mesh Firewall (HMF) and was positioned highest for Ability to Execute....more
Check Point News
Cyber Attacks Surge Against Education Sector Ahead of Back-to-School Season
As millions of students return to classrooms and campuses, schools are facing another challenge: a sharp rise in cyber attacks....more
Check Point Named a Leader in the 2025 Gartner Magic Quadrant for Hybrid Mesh Firewall
Delivering AI-powered network security across on-premises, cloud and SASE to prevent the most advanced threats...more
Upcoming Webinars
Wednesday, Sep 10, 2025 ET
Thursday, Sep 11, 2025 ET
About Data Connectors
Since 1999, Data Connectors has been facilitating relationships between senior executives who are looking for solutions and the vendors who provide them. Our community encompasses more than 650,000 professionals.
We produce this daily curation of industry news and events as a value to our community for free.
Upgrade to a Paid substack subscription to receive additional valuable posts. You will be supporting the community and will allow us to produce this service and to develop additional services.