DC: Security, Tech Field Day, Telco, Virtualization, Hitachi Vantara, Cisco, Fortinet, Proofpoint, Tenable, Webinars (Wed., July 30th Morning)
Articles Posted Week of Jul 21st, 2025 — Jul 27th, 2025 (328/4/5)
IT News You Can Use - Full Weekly Issue - Vol 328 Issue 4
Please share this newsletter with your IT friends and colleagues!
Security
Decoding Cloud Terminology: What 'Cloud-Native' Really Means
Most Data Breaches Have Unknown Causes As Transparency Continues To Fall
Tech Field Day
Telco
Virtualization
Hitachi Vantara News
Cisco News
Fortinet News
Proofpoint News
Cybersecurity Stop Of The Month: Detecting And Responding To An Account Takeover
NET RFQ: Request for Quote Scammers Casting Wide Net to Steal Real Goods
Tenable News
Tenable Boosts Vulnerability Priority Rating With Advanced AI
Tenable Enhances Vulnerability Rating System With AI To Improve Risk Prioritization
In a world of AI-driven software creation, microservices, and cloud-native architectures, traditional AppSec methods can't keep pace. This webinar builds on our latest ESG whitepaper to explore how Agentic AI is transforming AppSec from reactive to proactive. Register
Security
Decoding Cloud Terminology: What 'Cloud-Native' Really Means
Here's how cloud-native compares in meaning to cloud-based, cloud-ready, cloud-hosted, and cloud-first....more
Most Data Breaches Have Unknown Causes As Transparency Continues To Fall
The Identity Theft Resource Center (ITRC) reports 1,732 publicly disclosed data breaches in H1 2025, marking a 5% increase over the same period in 2024. The ITRC could track a record number of compromises in 2025 if the current data breach trend continues through Q3 and Q4....more
What 50 Companies Got Wrong About Cloud Identity Security
Most organizations still miss basic identity security controls in the cloud, leaving them exposed to breaches, audit failures, and compliance violations. A new midyear benchmark from Unosecur found that nearly every company scanned had at least one high-risk issue, with an average of 40 control failures per organization....more
Tech Field Day
Security Field Day 13 - Part 1 (Finally!)
Futurum Research analyst Fernando Montenegro shares his perspective on the security industry following his first appearance as a delegate at Security Field Day 13. For additional information and coverage from Security Field Day 13, you can visit the Futurum Group website....more
Why Supply Chain Security Is The First Line Of Defense
Tom Hollingsworth highlights the critical role of supply chain security as the foundational defense mechanism in protecting organizational systems and data....more
You Don't Need a CCIE to Build a Network - Until You Do
Keith Townsend's latest piece challenges the conventional wisdom around the necessity of having a CCIE for building networks given the advent of SONiC and Hedgehog...more
Telco
The Edge Of Telcos' AI Opportunity
As sectors like finance and healthcare charge ahead with AI deployments and the data centre industry lays claim to the 'nuts and bolts of the revolution' territory, much of the telecoms sector has remained extremely cautious with investment - with only a few early movers signalling real intent....more
Transform The Telecoms Industry Through OSS/BSS Evolution
In the rapidly evolving telecoms sector, agility is not just a desirable attribute - it is now an essential competitive requirement. Telecoms providers worldwide are increasingly adopting agile telco strategies, significantly transforming their operational support systems (OSS) and business support systems (BSS)....more
Join us to learn the best ways to make Google part of your security team and to achieve stronger security outcomes with the comprehensive capabilities of Google Unified Security - our converged security solution powered by AI. Register
Virtualization
VirtualBox 7.1.12 Brings Fixes for Nested VMs and Kernel Compatibility
VirtualBox 7.1.12 introduces critical fixes for nested VMs, resolves BSOD issues on Windows hosts, and provides support for the Linux kernel 6.16....more
Hitachi Vantara News
Hitachi Vantara Claims Hitachi IQ The Most Complete AI Stack
Hitachi Vantara says its approach to storage and AI offers the most comprehensive solutions, based on its industrial heritage and RAG-like functionality it claims others don't have...more
Cisco News
74% Of Tech Pros Use AI Weekly - Here's What They're Doing With It
The AI survey results are in! Thanks to all of you who participated in our recent survey asking how you're thinking about-and using-AI. Now it's time to reveal the results....more
Creating a NetAI Playground for Agentic AI Experimentation
Hey there, everyone, and welcome to the latest installment of 'Hank shares his AI journey.' 🙂 Artificial Intelligence (AI) continues to be all the rage, and coming back from Cisco Live in San Diego, I was excited to dive into the world of agentic AI....more
Fortinet News
Securing The Modern Workspace
Today's workspace goes far beyond traditional email and messaging apps. Users collaborate in tools like Confluence and Microsoft Teams, share files via Google Drive or Dropbox, and meet virtually on Zoom. These capabilities have made work more agile and distributed, but they've also significantly expanded the attack surface....more
Proofpoint News
Cybersecurity Stop Of The Month: Detecting And Responding To An Account Takeover
The Cybersecurity Stop of the Month blog series explores the ever-evolving tactics of today's cybercriminals and how Proofpoint helps organizations better fortify their defenses to protect people against today's emerging threats....more
NET RFQ: Request for Quote Scammers Casting Wide Net to Steal Real Goods
In this report, Proofpoint threat researchers take a deep dive into a widespread Request for Quote (RFQ) scam that involves leveraging common Net financing options (Net 15, 30, 45) to steal a variety of high value electronics and goods. Net financing of 15-90 days is the most common payment terms used by businesses....more
Tenable News
Tenable Boosts Vulnerability Priority Rating With Advanced AI
Tenable has announced advancements to its Vulnerability Priority Rating (VPR), incorporating AI-powered capabilities for heightened precision in identifying and addressing critical cybersecurity risks....more
Tenable Enhances Vulnerability Rating System With AI To Improve Risk Prioritization
Network security company Tenable Holdings Inc. today unveiled an artificial intelligence-powered update to its Vulnerability Priority Rating system, designed to help organizations better identify and respond to the vulnerabilities that pose the most serious threats....more
Zoomtopia 2025 brings together the thinkers, builders, and doers who are rewriting the rules of collaboration in the age of AI. See how leaders like you are creating smarter, more human ways to connect. Register
Upcoming Webinars - July 31st to Aug 13th
Thursday, Jul 31, 2025 ET
Monday, Aug 4, 2025 ET
Tuesday, Aug 5, 2025 ET
Wednesday, Aug 6, 2025 ET
Thursday, Aug 7, 2025 ET
Tuesday, Aug 12, 2025 ET
Wednesday, Aug 13, 2025 ET
About Data Connectors
Since 1999, Data Connectors has been facilitating relationships between senior executives who are looking for solutions and the vendors who provide them. Our community encompasses more than 650,000 professionals.
We produce this daily curation of industry news and events as a value to our community for free.
Upgrade to a Paid substack subscription to receive additional valuable posts. You will be supporting the community and will allow us to produce this service and to develop additional services.