DC: Security Boulevard, AI, Techstrong.ai, Backup, Developer, Rapid7, Check Point, Webinars (Fri. Jan 30th AM)
Articles Posted Week: Jan. 19th, 2026 — Jan. 25th, 2026 (334/3/9)
IT News You Can Use - Full Weekly Issue - Vol 334 Issue 3
Please share this newsletter with your IT friends and colleagues!
Security Boulevard
10 Questions Enterprise Leaders Should Ask Before Running A Red Teaming Exercise
Architecting Enterprise Readiness: Why SAML Still Wins the B2B Auth War
Attribute-Based Access Control (ABAC): Complete Guide With Policy Examples
Authentication Platform Comparison: Best Authentication Systems & Tools For Your Business
Extended Detection And Response (XDR): A New Era In Cybersecurity
AI
Techstrong.ai
Executive Brief: Questions AI Is Creating That Security Can’t Answer Today
GenAI On The Cloud: Architectures, Challenges And Cost Optimization
MLOps at Scale: Architecting AI Pipelines for Cost, Observability and Compliance
Backup
Developer
Technical Architecture Guide: Fixing Code Issues Early To Protect Developer Flow
OAuth Scopes & Consent: Complete Guide to Secure API Authorization
Rapid7 News
Check Point News
Attackers Continue To Target Trusted Collaboration Platforms: 12,000+ Emails Target Teams Users
Voidlink Signals The Start Of A New Era In AI-Generated Malware
Your users are being targeted right now. Deepfake attacks happen every few minutes, and nearly half of all organizations have already been hit. When a deepfake lands in your user's inbox, will they spot it or fall for it? Register
Security Boulevard
10 Questions Enterprise Leaders Should Ask Before Running A Red Teaming Exercise
Red Teaming has become one of the most discussed and misunderstood practices in modern cybersecurity. Many organizations invest heavily in vulnerability scanners and penetration tests, yet breaches continue to happen through paths those tools never simulate....more
Architecting Enterprise Readiness: Why SAML Still Wins the B2B Auth War
It’s 2025 and we are still arguing about xml tags while the rest of the world has moved on to json and sleek oidc flows. You’d think a tech stack from the early 2000s would be dead by now, but in the world of enterprise identity, saml is basically the cockroach that won’t quit....more
Attribute-Based Access Control (ABAC): Complete Guide With Policy Examples
Ever wonder why your users drop off at the login screen? It’s usually password fatigue. Honestly, making people remember strings like P@ssw0rd123! is just bad ux nowadays and it’s killing your conversion rates....more
Authentication Platform Comparison: Best Authentication Systems & Tools For Your Business
The digital landscape is changing fast, and if you’re looking at your career options, cybersecurity is basically the only place where the demand is literally “much faster than average.” We’re talking about a 29% growth rate through 2034 according to the U.S. Bureau of Labor Statistics-a source that tracks how many new analysts we’ll actually need (about 16,000 every year)....more
Extended Detection And Response (XDR): A New Era In Cybersecurity
The digital landscape is evolving at a rapid pace, and so are the threats that target organizations. With cyberattacks becoming more sophisticated and diverse, traditional security solutions often struggle to keep up. Businesses today need a more unified, proactive, and intelligent approach to detect and respond to threats. This is where Extended Detection and Response (XDR) comes into play....more
AI
What AI Skills Job Seekers Need To Develop In 2026
Knowing how to query ChatGPT, Gemini or Claude doesn’t make you an expert on genAI and AI tools. There’s a lot more to learn about in this fast-evolving area of tech....more
From AI Ambition To AI Production: Escaping The AI Pilot Trap
Enterprise interest in artificial intelligence has never been higher. Boards are asking for it. Business units are piloting it. Data science teams are experimenting with models at speed....more
Techstrong.ai
Executive Brief: Questions AI Is Creating That Security Can’t Answer Today
AI-led development has moved from experimentation to standard practice across modern software teams. GitHub reports that 92% of developers now use AI coding tools, with AI-generated code contributing to 40% or more of new code in many organizations. While productivity gains are substantial - studies show 25-35% faster task completion - AI introduces governance and audit questions that traditional AppSec programs were never designed to answer....more
In today's environment, speed and execution separate winners from the rest. The trends we've tracked for years-AI and generative AI, cloud maturity, data modernization, and true digital leadership - are no longer emerging; they're table stakes for competitive advantage. Register
GenAI On The Cloud: Architectures, Challenges And Cost Optimization
Nowadays, generative AI (GenAI) is no longer viewed as a revolutionary idea in research but as one of the business-essential features driving intelligent automation, content generation, hyper-personalized experiences and real-time decision-making....more
MLOps at Scale: Architecting AI Pipelines for Cost, Observability and Compliance
With AI shifting from experimental projects to mission-critical production systems, organizations face many challenges in operationalizing ML at scale. Model training and experimentation have converged - the stages with the most obstacles and pain have been removed, thanks to accessible frameworks and cloud-based infrastructure....more
Backup
What Is Ransomware? A Primer For IT Professionals
The question sounds almost too basic for 2026: what is ransomware? Yet tens of thousands of people search for this term every single month. And here’s the truth-even seasoned IT professionals need to revisit this topic because ransomware attacks have changed dramatically over the past few years....more
Developer
Technical Architecture Guide: Fixing Code Issues Early To Protect Developer Flow
Developer productivity depends on flow: the state where engineers maintain focus, context and momentum. When issues are discovered late in the development process - after commits, code reviews or CI builds - teams pay the price in context switching, rework and broken momentum....more
4 Trends That Will Transform Kubernetes In 2026
AI workloads will redefine Kubernetes in 2026 as organizations adopt stateful architectures, edge clusters and storage-focused recovery to support rapid growth....more
OAuth Scopes & Consent: Complete Guide to Secure API Authorization
Ever wonder why a fitness app asks to read your heart rate but doesn’t need your bank login? That’s oauth scopes doing the heavy lifting behind the scenes....more
Rapid7 News
From Signals To Strategy: What Security Teams Must Prepare For In 2026
The 2026 Security Predictions webinar reinforced a simple but uncomfortable truth. The forces shaping cyber risk are not new, but they are converging faster and with greater impact than many organizations are ready for. Geopolitics, insider risk, and threat intelligence have long influenced cyber operations. What has changed is the extent to which they directly affect everyday security decisions....more
Check Point News
Attackers Continue To Target Trusted Collaboration Platforms: 12,000+ Emails Target Teams Users
This report describes a phishing campaign in which attackers abuse Microsoft Teams functionality to distribute phishing content that appears to originate from legitimate Microsoft services. The attack leverages guest invitations and phishing-themed team names to impersonate billing and subscription notifications, encouraging victims to contact a fraudulent support phone number....more
Voidlink Signals The Start Of A New Era In AI-Generated Malware
Artificial intelligence is rapidly reshaping how organizations operate, innovate, and compete. But as AI becomes more powerful, it is also changing how cyber threats are created....more
Why Exposure Management Is Becoming A Security Imperative
Of course, organizations see risk. It’s just that they struggle to turn insight into timely, safe action. That gap is why exposure management has emerged, and also why it is now becoming a foundational security discipline....more
In this webinar, we will show how leading teams are redesigning Continuous Delivery to be resilient by default. You will see how automated resilience testing can be embedded directly into CD pipelines, how progressive delivery limits blast radius when risk is introduced, and how incident signals can trigger autonomous recovery actions such as policy-approved rollback or roll forward. Register
Upcoming Webinars
Wednesday, Feb 4, 2026 ET
Thursday, Feb 5, 2026 ET
Tuesday, Feb 10, 2026 ET
Wednesday, Feb 11, 2026 ET
About Data Connectors
Since 1999, Data Connectors has been facilitating relationships between senior executives who are looking for solutions and the vendors who provide them. Our community encompasses more than 650,000 professionals.
We produce this daily curation of industry news and events as a value to our community for free.
Upgrade to a Paid substack subscription to receive additional valuable posts. You will be supporting the community and will allow us to produce this service and to develop additional services.




