DC: Security, Security Boulevard - NHI, Edge, DR, Careers, Google, Veeam, Zscaler, Webinars (Wed. Jan 21st PM)
Articles Posted Week: Jan. 12th, 2026 — Jan. 18th, 2026 (334/2/6)
IT News You Can Use - Full Weekly Issue - Vol 334 Issue 2
Please share this newsletter with your IT friends and colleagues!
Security
Beyond MFA: Securing The Human Element With Identity Threat Detection
Detecting Forged Browser Fingerprints For Bot Detection, Lessons From LinkedIn
Security Boulevard - NHI
Edge
DR
Careers
Google News
Veeam News
Zscaler News
Beyond Patient Zero: Why Detection Is Dead And Quarantine Is King
Threat Intel, Ssl Inspection And Other Considerations: A Real-World Checklist For SSE
In this webinar, we'll look at how modern platforms like Harness enable golden pathways, self-service infrastructure-as-code, standardized environments, and easier service discovery - all of which accelerate platform adoption and improve engineering velocity. Register
Security
Top Cybersecurity Trends To Watch In 2026’s AI Economy
Cybersecurity in the AI Economy: Defending Digital Frontiers in 2026...more
NSA Urges Continuous Checks To Achieve Zero Trust
The agency leading the US government’s cryptology and cyber security strategies has published its latest zero-trust guidance...more
New Intelligence Is Moving Faster Than Enterprise Controls
AI is being integrated into core enterprise systems faster than many organizations can secure and govern it. A new global study from NTT shows companies expanding AI deployment while gaps in infrastructure readiness, data integrity controls, and governance frameworks continue to limit safe operation at scale....more
Beyond MFA: Securing The Human Element With Identity Threat Detection
In a recent webcast hosted by Enterprise Security Weekly host Adrian Sanabria and sponsored by ID Dataweb, Sanabria spoke with Dr. Torsten George, Cybersecurity Evangelist at ID Dataweb, about why identity threat detection has become critical - and why any form of multifactor authentication (MFA), once considered a near-silver bullet, is no longer enough....more
Detecting Forged Browser Fingerprints For Bot Detection, Lessons From LinkedIn
In my previous post, I showed how LinkedIn detects browser extensions as part of its client-side fingerprinting strategy. That post did surprisingly well, maybe because people enjoy reading about LinkedIn on LinkedIn....more
Security Boulevard - NHI
What Makes An NHI Management Strategy Scalable?
What Is Driving the Need for a Scalable NHI Management Strategy?...more
What Makes Non-Human Identities Reliable In Cloud Security
How Can Non-Human Identities Enhance Cloud Security?...more
Are AI Managed NHIs Reliable In Identity Management
What Are Non-Human Identities and Why Are They Critical in Cybersecurity?...more
How Does Non-Human Identity Management Enhance Scalability In Tech Ecosystems?
How Does Non-Human Identity Management Enhance Scalability in Tech Ecosystems?...more
Edge
Mastering The Architecture Of Hybrid Edge Environments
To manage the rapid growth of edge sites in 2026, IT leaders must build a hybrid architecture where technical teams and users collaborate on every level....more
Your users are being targeted right now. Deepfake attacks happen every few minutes, and nearly half of all organizations have already been hit. When a deepfake lands in your user's inbox, will they spot it or fall for it? Register
DR
How The Principles Of Disaster Recovery Can Guide Us With Cyber Resilience
Cyber resilience often gets treated as a new challenge driven by modern threats. It isn’t. We solved a version of this problem decades ago in disaster recovery. The lessons still apply....more
Careers
7 Reasons To Get Certified In API Security
API security is becoming more important by the day and skilled practitioners are in high demand. Now’s the time to level up your API security skillset....more
Google News
TranslateGemma: A New Suite Of Open Translation Models
We’re introducing TranslateGemma, a new collection of open translation models built on Gemma 3, helping people communicate across 55 languages, no matter where they are or what device they own....more
An Easier Way To Explore Search Trends With Gemini
The new Trends Explore page makes it simpler for journalists, creators and researchers to dive deep into Search trends with Gemini....more
Veeam News
Top Ransomware Attack Vectors And How To Defend Them
Ransomware isn’t new, but the way attackers gain access keeps evolving. In 2025, human‑targeted tactics and cloud‑based compromise dominate the threat landscape....more
Zscaler News
Beyond Patient Zero: Why Detection Is Dead And Quarantine Is King
A recent survey found the median ransomware variant can encrypt nearly 100,000 files (about 53.93GB) in 43 minutes....more
Fortify Your Future: How Zscaler Drives A Modern Defensible Architecture For Supercharged Cyber Resilience
In today’s hyper-connected world, cyber threats are not just a possibility, they’re a relentless reality. From sophisticated nation-state actors to organised criminal groups, the adversaries are more advanced and persistent than ever....more
Threat Intel, Ssl Inspection And Other Considerations: A Real-World Checklist For SSE
Somewhere in the middle of your cloud-first journey, there’s a moment that doesn’t feel like progress....more
Top 7 Requirements For Effective AI Red Teaming
Enterprises across the globe are racing to deploy AI across every business workflow, but with accelerated adoption comes a completely new set of risks - one that conventional security tooling was never designed to mitigate....more
AI agents are rapidly becoming the most powerful 'users' inside the enterprise. They provision infrastructure, move data, and call APIs with broader and more persistent access than human employees, yet they operate outside traditional safety nets. Unlike human access, there is currently no clear ownership, no certification process, and no accountability model for these machine identities. Register
Upcoming Webinars
Wednesday, Jan 28, 2026 ET
Thursday, Jan 29, 2026 ET
Tuesday, Feb 3, 2026 ET
About Data Connectors
Since 1999, Data Connectors has been facilitating relationships between senior executives who are looking for solutions and the vendors who provide them. Our community encompasses more than 650,000 professionals.
We produce this daily curation of industry news and events as a value to our community for free.
Upgrade to a Paid substack subscription to receive additional valuable posts. You will be supporting the community and will allow us to produce this service and to develop additional services.




