DC: Security, Security Boulevard - NHI, Telco, Database, ESET, Fortinet, CrowdStrike, Sophos, Webinars (Tues. Jan 27th AM)
Articles Posted Week: Jan. 19th, 2026 — Jan. 25th, 2026 (334/3/3)
IT News You Can Use - Full Weekly Issue - Vol 334 Issue 3
Please share this newsletter with your IT friends and colleagues!
Security
Security Boulevard - NHI
Telco
Database
Bare Metal For Databases: How To Get Faster Queries And More Stable Performance
How OpenAI Is Scaling The PostgreSQL Database To 800 Million Users
ESET News
Fortinet News
FortiSIEM 7.5 Powers the Modern SOC with Agentic AI and Data Sovereignty Compliance
Reimagining AI From A Security Risk Into An Asset With Fortinet
CrowdStrike News
Sophos News
Your users are being targeted right now. Deepfake attacks happen every few minutes, and nearly half of all organizations have already been hit. When a deepfake lands in your user's inbox, will they spot it or fall for it? Register
Security
90% Of Companies Are Woefully Unprepared For Quantum Security Threats - Analysts Say They Need To Get A Move On
Quantum security threats are coming, but a Bain & Company survey shows systems aren’t yet in place to prevent widespread chaos...more
Cyber Insights 2026: Regulations And The Tangled Mess Of Compliance Requirements
SecurityWeek’s Cyber Insights 2026 examines expert opinions on the expected evolution of more than a dozen areas of cybersecurity interest over the next 12 months. We spoke to hundreds of individual experts to gain their expert opinions. Here we explore the cyber regulations and compliance outlook for 2026, with the purpose of preparing cybersecurity teams for what lies ahead this year and beyond....more
Cybersecurity Trends To Watch In 2026
2026 is already resetting the stakes. Last year, more than 4,100 publicly disclosed data breaches were reported globally, nearly 11 a day, with the average cost reaching about $4.44 million....more
More Security Tools Are Slowing Down Your Incident Response
Tool sprawl often increases investigation times and reduces efficiency. Break data silos with unified SIEM and SOAR platforms....more
Security Boulevard - NHI
Can AI Manage Cloud Security Effectively?
How do organizations ensure that their cloud environments are not just secure but intelligently managed? The answer lies in understanding the potential of AI in cloud security. With machines become predominant players in our IT infrastructure, the management of Non-Human Identities (NHIs) has emerged as a pivotal strategy for securing clouds....more
Can Managing NHIs Keep Companies Ahead In Cybersecurity?
Have you ever considered the risks associated with the identities of machines in your network? With cybersecurity professionals continue to confront increasingly complex threats, a crucial, often overlooked area is the management of Non-Human Identities (NHIs) and their associated secrets. Integrating NHI management into an organization’s cybersecurity strategy is essential for bridging the security gaps between innovation and protection....more
How Are Non-Humans Identities Protected?
Where technology drives growth and innovation, are we adequately securing the machine identities that power our digital? Non-human identities (NHIs), encompassing machine identities like APIs, service accounts, and IoT devices, play a pivotal role in modern cybersecurity architectures. Yet, their management often lags behind due to a disconnect between security and R&D teams, especially in organizations leveraging cloud environments....more
In this webinar, we will show how leading teams are redesigning Continuous Delivery to be resilient by default. You will see how automated resilience testing can be embedded directly into CD pipelines, how progressive delivery limits blast radius when risk is introduced, and how incident signals can trigger autonomous recovery actions such as policy-approved rollback or roll forward. Register
How Do NHIs Empower Agile Cybersecurity Strategies?
Have you ever considered how machine identities, or Non-Human Identities (NHIs), impact cybersecurity in cloud environments? NHIs act as the digital passports for machines, governing how they interact with systems and data. With organizations increasingly relying on automated systems and cloud-based services, effective NHI management is more crucial than ever. We will explore the strategic importance of NHIs and how they empower agile cybersecurity strategies....more
Telco
The Telco AI Factory: Co-Shaping The Future With Intelligent Communications Platforms
The telecommunications industry is moving beyond being a traditional connectivity provider....more
Database
Bare Metal For Databases: How To Get Faster Queries And More Stable Performance
As databases grow, it’s only natural that the infrastructure sustaining them needs to be able to support this expansion. Servers act as the foundation of modern databases, and so they must provide enough power and speed for fast query handling and transaction processing....more
Best Database Choices For Building Web Apps In 2026
Choosing a database is no longer a background decision in web development. It shapes how fast an application runs, how well it scales, and how securely it handles data....more
How OpenAI Is Scaling The PostgreSQL Database To 800 Million Users
While vector databases still have many valid use cases, organizations including OpenAI are leaning on PostgreSQL to get things done. In a blog post on Thursday, OpenAI disclosed how it is using the open-source PostgreSQL database....more
ESET News
How Social Engineering Attacks Work: Psychology, Tactics, And Real Examples
Social engineering attacks are one of the most effective cybersecurity threats because they exploit human psychology instead of technical vulnerabilities....more
Fortinet News
2026 Cloud Security Report Data Reveals ‘Complexity Gap’
As more and more enterprises catapult into an AI-powered future, cloud security is more critical than ever to an organization’s success and, perhaps even, survival. The velocity of AI adoption is fundamentally changing how cloud environments are managed and expanding the attack surface at a speed that outpaces traditional security models and teams’ ability to protect modern deployments....more
FortiSIEM 7.5 Powers the Modern SOC with Agentic AI and Data Sovereignty Compliance
Security operations centers (SOCs) are increasingly defending against the sophistication and speed of AI-enabled attackers. At the same time, data and operational sovereignty concerns can make it difficult for multinational organizations to operate an effective centralized SOC....more
Reimagining AI From A Security Risk Into An Asset With Fortinet
Enterprises that move toward broad AI adoption often discover that, in spite of various benefits, it also introduces new security challenges. At AI Field Day 7, Fortinet presented a clear assessment of those risks and demonstrated how the Fortinet Security Fabric and FortiAI Assist can support secure deployment of AI systems....more
CrowdStrike News
Small Devices, Big Risk: Usb Drives Threaten Enterprise Security
How CrowdStrike protects data going out, and threats coming in, across removable media....more
Sophos News
Grupo NGO Gains 24/7 Security Visibility Without Expanding Its IT Team
Grupo NGO is a diversified business group based in Asuncion, Paraguay, with operations across appliance import and distribution, retail, livestock farming, real estate, and hospitality....more
An exclusive invitation for digital leaders at Sitecore customer organizations--Hosted by Tech Talk Summits Register
Upcoming Webinars
Wednesday, Jan 28, 2026 ET
Thursday, Jan 29, 2026 ET
Tuesday, Feb 3, 2026 ET
About Data Connectors
Since 1999, Data Connectors has been facilitating relationships between senior executives who are looking for solutions and the vendors who provide them. Our community encompasses more than 650,000 professionals.
We produce this daily curation of industry news and events as a value to our community for free.
Upgrade to a Paid substack subscription to receive additional valuable posts. You will be supporting the community and will allow us to produce this service and to develop additional services.




