DC: Security, Security Boulevard - NHI, Technology, Techstrong.IT, Email, Dell, KnowBe4, Webinars (Thurs. Jan 22nd AM)
Articles Posted Week: Jan. 12th, 2026 — Jan. 18th, 2026 (334/2/7)
IT News You Can Use - Full Weekly Issue - Vol 334 Issue 2
Please share this newsletter with your IT friends and colleagues!
Security
Forget Predictions: True 2026 Cybersecurity Priorities From Leaders
Zero-Trust Isn’t Optional Anymore - It’s Your AI Agent Fire Drill
How The OWASP Application Security Verification Standard Helps Improve Software Security
Security Boulevard - NHI
Technology
Techstrong.IT
Infrastructure Complexity Emerges As Primary Barrier To Enterprise AI Adoption: Survey
Cloud FinOps and Security: Centralized Control vs. Empowered Teams
The Choice Is Yours: Stop Paying The All-Flash Tax For Cold Data
Email
Dell News
KnowBe4 News
CyberheistNews Vol 16 #02 When You Can’t Believe Your Eyes: AI and the New Misinformation Playbook
Phishing Campaign Abuses Google’s Infrastructure To Bypass Defenses
Threat Actors Exploit Misconfigurations To Spoof Internal Emails
The pace of technology change is relentless - and leaders who don't anticipate what's next risk falling behind. In this exclusive Gartner webinar, you'll hear directly from the lead analyst behind the Top Strategic Technology Trends for 2026. Register
Security
Forget Predictions: True 2026 Cybersecurity Priorities From Leaders
Security leaders chart course beyond predictions with focus on supply chain, governance, and team efficiency....more
Zero-Trust Isn’t Optional Anymore - It’s Your AI Agent Fire Drill
Here is the ugly truth about security incidents today. The bad guys don’t storm the castle breaking down the walls. Most attacks start with a login that was obtained. Once inside they see where they can go and what they can do. They enter the front door with working keys....more
Cyber Insights 2026: Social Engineering
The most successful breaches in 2026 are likely to exploit trust, not vulnerabilities. All courtesy of artificial intelligence (AI)....more
Why Security Teams Are Becoming Deployment Bottlenecks
For years, security teams were positioned as a final checkpoint in the software delivery process. Their role was to review, approve, and sign off before production releases. That model no longer exists....more
How The OWASP Application Security Verification Standard Helps Improve Software Security
A short time ago, we announced our integration of OWASP ASVS into our cyber risk management platform. At a high level, this allows organizations to run more structured, repeatable security assessments for web applications and cloud-based services, while also giving security and procurement teams a consistent way to evaluate internally developed and third-party software....more
Security Boulevard - NHI
Do AI-Driven Security Systems Empower Compliance
Are Non-Human Identities the Missing Link in AI-Driven Security?...more
How Empowered Are Your Secret Management Protocols?
Where cybersecurity concerns are front and center for organizations across many sectors, the question of how to manage Non-Human Identities (NHIs) and secrets cannot be overlooked. Machine identities, often composed of an encrypted password, token, or key, play an indispensable role in interconnected digital environments. Yet, the approach to securing these elements often lags, creating vulnerabilities and compliance headaches....more
Technology
Top 10 Tech Trends Expected To Dominate In 2026
Technology in 2026 Is Moving Toward Smarter, Faster, and More Human-Centric Innovation...more
The Agile International Conference 2026 brings together four focused summits designed to equip leaders, teams, and professionals for a world shaped by AI, agility, and rapid change. Register
Techstrong.IT
Infrastructure Complexity Emerges As Primary Barrier To Enterprise AI Adoption: Survey
A new survey has found that infrastructure complexity, rather than technological capability, has become the primary obstacle preventing enterprises from successfully scaling artificial intelligence (AI) initiatives....more
Cloud FinOps and Security: Centralized Control vs. Empowered Teams
As many organizations expedite the adoption of cloud, a single question consistently dominates the leadership table: Should cloud be treated purely as another data center with centralized control? Or should teams be fully authorized with guardrails?...more
The Choice Is Yours: Stop Paying The All-Flash Tax For Cold Data
Organizations today generate unprecedented volumes of data as AI systems, analytics engines, automation frameworks and digital workflows continue to expand. Yet, despite the rapid growth in data creation, the fundamental behavior of enterprise data has not changed....more
Email
AI For Email Marketing: Personalization, Automation, And Best Practices
How AI for Email Marketing is Replacing Guesswork With Real-Time Personalization...more
Five Questions To Ask About Email Whitelists
The company just approved a significant zero-trust investment that included microsegmentation, identity-first access, and continuous verification across the network’s infrastructure. The board signed off - and implementation proceeded. Now ask the CISO how many permanent exceptions exist in the company’s email security whitelist?...more
Email Is Not Legacy. It’s Infrastructure.
Email doesn’t always get the respect it deserves. In a world brimming with slick collaboration platforms, instant messaging apps, and AI copilots, email is often seen as old-fashioned-a legacy system clinging on in the face of faster, flashier alternatives....more
Dell News
Resilience Debt: The Silent Risk Undermining Cyber Recovery
Resilience debt is growing silently - until it breaks recovery. Why confidence, not attacks, may be your biggest cyber risk....more
Dell Bolsters PowerStore Array With Capacity, Security Features
Dell PowerStore adds storage density and promises to reduce total cost of ownership by 15%....more
KnowBe4 News
CyberheistNews Vol 16 #02 When You Can’t Believe Your Eyes: AI and the New Misinformation Playbook
When You Can’t Believe Your Eyes: AI and the New Misinformation Playbook...more
Phishing Campaign Abuses Google’s Infrastructure To Bypass Defenses
Researchers at RavenMail warn that a major phishing campaign targeted more than 3,000 organizations last month, primarily in the manufacturing industry....more
Threat Actors Exploit Misconfigurations To Spoof Internal Emails
Attackers are increasingly abusing network misconfigurations to send spoofed phishing emails, according to researchers at Microsoft. This technique isn’t new, but Microsoft has observed a surge in these attacks since May 2025....more
Storage security changes and adaptations are a fact of life to deal with the ever-changing threat and regulatory landscapes. A black swan event, a new standard, or a regulation often serves as a catalyst for organizations to review their controls and practices. Register
Upcoming Webinars
Friday, Jan 23, 2026 ET
Monday, Jan 26, 2026 ET
Tuesday, Jan 27, 2026 ET
Wednesday, Jan 28, 2026 ET
About Data Connectors
Since 1999, Data Connectors has been facilitating relationships between senior executives who are looking for solutions and the vendors who provide them. Our community encompasses more than 650,000 professionals.
We produce this daily curation of industry news and events as a value to our community for free.
Upgrade to a Paid substack subscription to receive additional valuable posts. You will be supporting the community and will allow us to produce this service and to develop additional services.




