DC: Storage, Security Boulevard, AI, Operations, Google, Okta, Webinars (Thurs. Jan 8th PM)
Articles Posted Week: Dec. 29th, 2025 — Jan. 4th, 2026 (333/5/8)
IT News You Can Use - Full Weekly Issue - Vol 333 Issue 5
Please share this newsletter with your IT friends and colleagues!
Storage
Security Boulevard
Real-World Cyber Attack Detection: How Modern Socs Identify, Block, And Contain Advanced Threats
Recent Cyber Attacks And Threat Actor Activity: A Deep Dive Into The Evolving Threat Landscape
SHARED INTEL Q&A: Why Data Bill of Materials (DBOM) is surfacing as a crucial tool to secure AI
Why 60% Of Firewalls Fail High-Severity Checks And How NSPM Fixes It
AI
What’s Next In AI? 10 Predictions For Automation And Work In 2026
Understanding Ai-Native Cloud: From Microservices To Model-Serving
Operations
Stop Chasing False Alarms: How AI-Powered Traffic Monitoring Cuts Alert Fatigue
Chargeback Management Ultimate Guide: Tools, Prevention & Best Practices (2026)
The Architect’s Dilemma: Choose A Proven Path Or Pave Your Own Way?
Google News
Best of 2025: Google To Spend $75 Billion On AI, Cloud Investment
Introducing Gemini 3 Flash: Intelligence And Speed For Enterprises
Cloud CISO Perspectives: 2025 In Review: Cloud Security Basics And Evolving AI
Cloud CISO Perspectives: Our 2026 Cybersecurity Forecast Report
Okta News
How Tech And Nonprofits Are Teaming Up To Fight Cyber Threats
Okta And Mclaren F1 Team: Lando Norris On Securing What Matters Most
Payroll Pirates Target Help Desks To Siphon Employee Paychecks
In this session, we'll show how Elastic Workflows helps security teams automate both the work that needs precision and the work that requires interpretation. You'll see how workflows handle automation that must be consistent and predictable, and how AI agents can be used within workflows to gather context, correlate signals, and surface likely explanations when the next step isn't obvious. Register
Storage
Why Storage Architecture is the New Bottleneck for HPC and AI Teams
Every year at Supercomputing, the conversations reveal where the industry’s pressure points really are. This year in St. Louis, the pattern was unmistakable: as GPU clusters scale, organizations are hitting a wall that has nothing to do with compute power....more
Security Boulevard
Real-World Cyber Attack Detection: How Modern Socs Identify, Block, And Contain Advanced Threats
Modern cyberattacks rarely appear as a single obvious incident. Instead, they manifest as multiple low-level signals across web, endpoint, DNS, cloud, and network telemetry. When analyzed in isolation, these signals may seem benign. When correlated intelligently, they reveal active attack campaigns targeting applications, identities, cloud storage, and network boundaries....more
Recent Cyber Attacks And Threat Actor Activity: A Deep Dive Into The Evolving Threat Landscape
Over the past week, global threat activity has highlighted a critical reality: modern cyber attacks are faster, more coordinated, and increasingly industrialized. From mass exploitation of web application vulnerabilities to ransomware-as-a-service operations and record-breaking volumetric DDoS attacks, adversaries continue to evolve both tactically and operationally....more
SHARED INTEL Q&A: Why Data Bill of Materials (DBOM) is surfacing as a crucial tool to secure AI
Enterprises hustling to embed AI across their operations came to an uncomfortable realization in 2025: they lost track of the data powering those systems....more
The Top 26 Security Predictions For 2026 (Part 2)
Last week, in part one of ‘The Top 26 Security Predictions for 2026,’ I covered the top 15 cyber industry company reports and offered a summary of industrywide security predictions, forecasts and trends....more
Why 60% Of Firewalls Fail High-Severity Checks And How NSPM Fixes It
Firewall audit failures are not edge cases anymore. They are the norm....more
AI
What’s Next In AI? 10 Predictions For Automation And Work In 2026
AI in 2026: Ten Bold Predictions Redefining Automation and Careers...more
The Top 10 AI Stories Of 2025
The most-read AI stories from CIO, Computerworld, CSO, InfoWorld, and Network World....more
Understanding Ai-Native Cloud: From Microservices To Model-Serving
Traditional cloud architectures are buckling under the weight of generative AI. To move from pilots to production, enterprises must adopt a ‘design-first’ architecture that treats intelligence as a core utility....more
AI Fatigue: Is The Backlash Against AI Already Here?
The proliferation of AI tools in the market is creating confusion, decision paralysis, and declining productivity......more
Join us for this webinar where James McQuiggan, CISO Advisor at KnowBe4, shares valuable insights and proactive strategies to strengthen your security framework against sophisticated attacks. Register
Operations
Stop Chasing False Alarms: How AI-Powered Traffic Monitoring Cuts Alert Fatigue
Security teams face an impossible choice: set thresholds too sensitive and drown in false positives, or set them too loose and miss real attacks. Traditional monitoring systems force this trade-off because they can’t distinguish between legitimate traffic fluctuations and actual threats....more
Chargeback Management Ultimate Guide: Tools, Prevention & Best Practices (2026)
Chargeback management is the set of processes businesses use to monitor, prevent, and respond to payment disputes. For companies that accept card payments, having a structured approach to chargebacks is an important part of managing payment risk and day-to-day operations....more
The Architect’s Dilemma: Choose A Proven Path Or Pave Your Own Way?
Developing software is like taking a journey on which a team is continually making decisions about which way to go, both about the functionality of what they are building (the MVP), and also about what sort of architecture they need to support the MVP (the MVA)....more
Google News
Best of 2025: Google To Spend $75 Billion On AI, Cloud Investment
Google is ramping up its investment in cloud and artificial intelligence (AI) infrastructure with plans to allocate $75 billion toward expanding capacity in 2025. The increased spending will primarily focus on enhancing technical infrastructure, including cloud servers and data centers....more
Introducing Gemini 3 Flash: Intelligence And Speed For Enterprises
Google is expanding the Gemini 3 model family with Gemini 3 Flash, which offers frontier intelligence built for speed at a fraction of the cost....more
Cloud CISO Perspectives: 2025 In Review: Cloud Security Basics And Evolving AI
Welcome to the second Cloud CISO Perspectives for December 2025. Google Cloud’s Nick Godfrey, senior director, and Anton Chuvakin, security advisor, look back at the year that was....more
Cloud CISO Perspectives: Our 2026 Cybersecurity Forecast Report
Welcome to the first Cloud CISO Perspectives for December 2025. Today, Francis deSouza, COO and president, Security Products, Google Cloud, shares our Cybersecurity Forecast report for the coming year, with additional insights from our Office of the CISO colleagues....more
Okta News
How Tech And Nonprofits Are Teaming Up To Fight Cyber Threats
Nonprofits were never built to wage cyberwar. Their missions are rooted in feeding families, funding research, and sheltering communities. Yet behind the scenes, these same organizations have quietly become prime targets for attackers....more
Okta And Mclaren F1 Team: Lando Norris On Securing What Matters Most
In this exclusive interview, Norris shares how he ‘secures’ the elements vital to his success: from physical readiness and mental fortitude to team communication, downtime, and optimizing his car’s performance. Just as Norris relies on a vast network of experts and precise execution, organizations worldwide depend on Okta to help secure access for their employees and customers....more
Payroll Pirates Target Help Desks To Siphon Employee Paychecks
Thieves have their eyes on your payroll. But instead of using a mask and a gun, they are sitting behind a keyboard and a phone....more
Join experts from Checkmarx and Techstrong Group, along with Global Engineering Platforms Lead at Thoughtworks, for a forward-looking conversation about how AI can transform DevSecOps adoption. Register
Upcoming Webinars
Tuesday, Jan 20, 2026 ET
Quantum Computing Security: Preparing Today for Tomorrow’s Threats (Jan. 20th) -- 1:00 PM to 2:00 PM
Wednesday, Jan 21, 2026 ET
Thursday, Jan 22, 2026 ET
Architecting Trustworthy AI: From Design Principles to Live Defense (Jan 22nd) -- 1:00 PM to 2:00 PM
About Data Connectors
Since 1999, Data Connectors has been facilitating relationships between senior executives who are looking for solutions and the vendors who provide them. Our community encompasses more than 650,000 professionals.
We produce this daily curation of industry news and events as a value to our community for free.
Upgrade to a Paid substack subscription to receive additional valuable posts. You will be supporting the community and will allow us to produce this service and to develop additional services.




