DC: Security, Humor, Call Centers, Encryption, Google, KnowBe4, Okta, Webinars (Tue., Aug 19th Afternoon)
Articles Posted Week of Aug 11th, 2025 — Aug 17th, 2025 (329/2/4)
IT News You Can Use - Full Weekly Issue - Vol 329 Issue 2
Please share this newsletter with your IT friends and colleagues!
Security
Confidential Computing: A Solution To The Uncertainty Of Using The Public Cloud
From Vulnerabilities To Exposures: Cyber Risk Lessons From The 2025 DBIR
Humor
Call Centers
Encryption
Google News
KnowBe4 News
Okta News
When it comes to AI and HPC infrastructure, performance claims are everywhere - but how do you separate marketing from reality? Trusted, third-party benchmarks like MLPerf and IO500 give you the clarity you need to make smart decisions. Register
Security
7 Reasons The SOC Is In Crisis - And 5 Steps To Fix It
Breaches continue to happen as SOC analysts deal with too many alerts or rules of engagement that stops them from acting. Here are some of the common problems and how to fix them....more
Confidential Computing: A Solution To The Uncertainty Of Using The Public Cloud
With the increasing uncertainty we currently experience in the political world stage comes that more and more companies reevaluate their presence in the cloud and the on-premise data center in the light of operational resilience and data sovereignty....more
From Vulnerabilities To Exposures: Cyber Risk Lessons From The 2025 DBIR
Cybersecurity teams are drowning in CVEs - and attackers are counting on it....more
Identity Security Is More Important Than Ever - Here's Why
Agentic AI adoption means identity security is a critical focus for cyber professionals...more
Humor
Pay Attention, Class: Today You'll Learn The Wrong Way To Turn Things Off
This week, meet a reader we'll Regomize as 'Steven'. 'One of my first jobs in the 1980s was as a training instructor at the headquarters of CAD CAM company Intergraph,' Steven wrote....more
Sysadmin Cured A Medical Mystery By Shifting A Single Cable
Few make it to Friday without some end-of-week blues, which The Register always treats with a fresh dose of On Call - the reader-contributed column that recounts your stories of tech support contusions. This week, meet a reader we'll Regomize as 'Jake' who told us of the time he worked as the sole sysadmin for an entire hospital....more
There is no one way to build a cybersecurity program. Every CISO has their own approach, and every organization has its own unique blend of culture, technical infrastructure, and risk appetite. Register
Call Centers
AI Receptionist' IVR Takes Flight With Customer Service
Traditional rules-based interactive voice response technology could be on its way out....more
Ready For The Next Disaster?
April marks the first full month of spring. It is also the start of the hurricane and wildfire seasons: as Florida and southern California respectively slowly recover from theirs. And tornadoes can now happen most anywhere and at anytime....more
Encryption
An Explanation Of Post-Quantum Cryptography
In this video, Informa TechTarget senior site editor Michaela Goss explains how quantum computers threaten modern encryption standards and why post-quantum cryptography is critical for protecting data in the quantum era....more
Quantum Threat Is Real: Act Now With Post Quantum Cryptography
Cybersecurity has always had to keep pace with the evolution of cyberattacks. These attacks started gaining prominence in the late 80s, in line with the spread of internet access. Initially, viruses, worms and different types of malware were configured to target laptops and desktops....more
Google News
Catch Up On The Newest Features In August's Gemini Drop.
Gemini Drops are our regular update on what's new in the Gemini app....more
Google Launches Jules, An Asynchronous Coding Agent Powered By Gemini 2.5
Google has moved Jules, its asynchronous, agent-based coding assistant, out of beta and into general availability, positioning it as a tool for developers who want to offload routine programming tasks....more
KnowBe4 News
Alert: Tech Support Scammers Send Phony Podcast Invites
The Better Business Bureau (BBB) has warned that scammers are targeting high-profile employees and influencers with fake invitations to appear as a guest on popular celebrity podcasts....more
Okta News
Bridging The Gap In Browser Security With Google And Okta
Browsers are today's primary work portal. Most corporate applications and sensitive data now live behind SaaS and other cloud services, and we reach them through browsers like Chrome, Edge, and Safari....more
In this webinar, experts will explain how to ask the questions necessary to build the incident response playbook that fits your organization, and how to test the playbook so that you know the plan is functional and effective. Register
Upcoming Webinars - Aug 27th to Sep 17th
Wednesday, Aug 27, 2025 ET
Friday, Aug 29, 2025 ET
Thursday, Sep 4, 2025 ET
Wednesday, Sep 10, 2025 ET
Thursday, Sep 11, 2025 ET
Wednesday, Sep 17, 2025 ET
About Data Connectors
Since 1999, Data Connectors has been facilitating relationships between senior executives who are looking for solutions and the vendors who provide them. Our community encompasses more than 650,000 professionals.
We produce this daily curation of industry news and events as a value to our community for free.
Upgrade to a Paid substack subscription to receive additional valuable posts. You will be supporting the community and will allow us to produce this service and to develop additional services.