DC: Storage, Security Boulevard, ERP, Techstrong.ai, Email, SAP, Red Hat, Okta, Webinars (Wed. Jan 28th PM)
Articles Posted Week: Jan. 19th, 2026 — Jan. 25th, 2026 (334/3/6)
IT News You Can Use - Full Weekly Issue - Vol 334 Issue 3
Please share this newsletter with your IT friends and colleagues!
Storage
Security Boulevard
The Hidden Cybersecurity Risk Of ‘Integrated’ Security Platforms
The Zero Risk Trap: How To Ditch Perfection And Prioritize Real Cyber Resilience
This Guide Will Show You How To Create SAML Identity Management.
Understanding Customer Identity And Access Management (CIAM): Essential Information You Need To Know
ERP
Techstrong.ai
Email
4 Ways Email Automation Will Reshape Customer Journeys In 2026
Improve Email Deliverability With Proven Technical And Strategic Steps
SAP News
Red Hat News
Extend And Enhance Your Red Hat Enterprise Linux Support: A Guide To Lifecycle Add-Ons
New Observability Features In Red Hat OpenShift 4.20 And Red Hat Advanced Cluster Management 2.15
Okta News
Digital Proof Of Employment: A New Foundation For Workforce Trust
Introducing The Okta MCP Server: Securely Interact With Your Okta Org Using Natural Languages
Come to the ITEXPO #TECHSUPERSHOW to meet with the right business partners, to evaluate and choose the right technology options for your needs, and to stay ahead of threats by keeping an eye on today's best-in-class cybersecurity tools. Nine Collocated Conference Tracks at the "Shiny New Convention Center"! Register
Storage
5 Reasons HDDs Will Continue To Dominate Enterprise Storage In The AI Era
Enterprises today are grappling with an unprecedented surge in data creation. Every interaction from video and images to logs, sensor outputs, and (AI-)generated content is contributing to an exponential rise in what businesses must store and analyze....more
Security Boulevard
The Data Center Is Secure, But Your Users Are Not
Today’s data centers are hardened facilities with layered access controls, surveillance, redundancy and security teams focused on keeping threats out. Yet, even the most secure environment can be compromised by a single moment of trust, such as a legitimate-looking email that prompts someone to click a link....more
The Hidden Cybersecurity Risk Of ‘Integrated’ Security Platforms
In today’s cybersecurity market, nearly every vendor claims to offer an integrated or unified platform. For buyers under pressure to reduce complexity, these promises are appealing. But beneath the marketing language lies a reality that many organizations only discover after a breach: integration does not equal unification....more
The Zero Risk Trap: How To Ditch Perfection And Prioritize Real Cyber Resilience
In Star Trek, the Kobayashi Maru simulation is an unwinnable test faced by Starfleet cadet captains. The only way to ‘win’ is to accept that you can’t. It’s a test of character - forcing cadet captains to choose between impossible options and live with the consequences....more
This Guide Will Show You How To Create SAML Identity Management.
Ever wonder why your ai assistant is great at writing poems but can’t tell you what’s actually happening in your own database? It’s basically because most models are trapped in a digital “black box” without any real-time connection to the outside world....more
Understanding Customer Identity And Access Management (CIAM): Essential Information You Need To Know
Ever feel like you’re throwing gold bars into a black hole? That’s usually how it feels when security startups hire “expert” writers to produce one 2,000-word blog post a week while the competition is somehow ranking for ten thousand different keywords overnight....more
ERP
ERP Isn’t Dead Yet - But Most Execs Are Planning The Wake
7 out of 10 C-suite cats reckon software category’s best days are behind it, but can’t agree what’s next...more
Techstrong.ai
Model Context Protocol Sets New Benchmark For AI Safety
The Model Context Protocol (MCP) addresses a long-standing issue in AI systems. For years, AI assistants lacked the ability to use live data or operate within external systems. MCP was made open-source in late 2024. It now serves as a key standard that has increased the accessibility of AI agents within the industry....more
AI shouldn't be a mystery. As organizations adopt AI-driven defenses, security teams need to understand and trust the decisions these tools make. This session debunks the 'black box' myth: the idea that AI decisions are inherently opaque and unknowable. Register
Sovereign AI In 2026: From Ambition To Production Reality
Sovereign AI has moved from a niche policy topic to a central theme in national and enterprise technology strategies. At its core, sovereign AI is the idea that countries, regions, and regulated industries should be able to develop and run artificial intelligence on infrastructure, data, and models that they control. The goal is to protect sensitive information, comply with local regulation, and avoid over dependence on a few global cloud platforms....more
AI Risk In SaaS: What Security Teams Are Missing
Even if you’re still accidentally writing ‘2025’ on important documents... AI has already moved on without you. Not in a sci-fi, you-no-longer-exist kind of way. In a very boring, very operational, very ‘wait-that tool has AI now?’ way. And that’s a problem....more
Email
4 Ways Email Automation Will Reshape Customer Journeys In 2026
In 2026, businesses that want to succeed can no longer send ‘one-size-fits-all’ email campaigns to their entire contact list or segment consumers by simple demographics such as gender, age, or location. In fact, data shows that 71% of consumers expect businesses to deliver personalized interactions....more
Improve Email Deliverability With Proven Technical And Strategic Steps
The ability to simply get your email into the recipient’s inbox instead of the spam folder is known as email deliverability. Everything depends on this because if people cannot see your messages, then they cannot open them, click anything inside them, or simply convert....more
SAP News
Why AI Without Humanity Is Incomplete
Artificial intelligence (AI) has moved far beyond experimentation. It is already reshaping how industries operate, how economies evolve, and how people experience work....more
Red Hat News
Extend And Enhance Your Red Hat Enterprise Linux Support: A Guide To Lifecycle Add-Ons
Red Hat Enterprise Linux (RHEL) is the foundation for countless mission-critical deployments. But what happens when your business needs to stay on a specific version of RHEL longer than the standard lifecycle, or requires enhanced security beyond what the already-robust subscription delivers by default? That’s where RHEL lifecycle add-ons come in....more
New Observability Features In Red Hat OpenShift 4.20 And Red Hat Advanced Cluster Management 2.15
The latest release of the Red Hat OpenShift cluster observability operator 1.3 introduces observability signal correlation, incident detection, application performance monitoring (APM) dashboard, and more....more
Understanding Security Embargoes At Red Hat
Within Red Hat’s Coordinated Vulnerability Disclosure (CVD) framework, an embargo is a strictly-defined window of time during which a security vulnerability is known only to a small group of trusted parties before being made public, including the vulnerability reporter and the relevant upstream community and partners....more
Okta News
Beyond The Login: Securing Identity In The Age Of AI Agents
In my role as a Senior Corporate Customer Account Executive at Okta, I spend my days managing relationships. While forecasting deals and territory planning are part of the job, the core of what I do is listening. I manage a book of business where customers have already invested with us, and my goal is to ensure they are getting value and solving critical business problems....more
Digital Proof Of Employment: A New Foundation For Workforce Trust
For today’s enterprises, some of the highest risk moments don’t happen during login, they happen when someone needs help - especially with the rise of AI tools that clone voices, generate fake identities, and create convincing phishing emails....more
Introducing The Okta MCP Server: Securely Interact With Your Okta Org Using Natural Languages
Introducing the Okta MCP Server: Securely interact with your Okta org using natural languages...more
In this webinar, we will show how leading teams are redesigning Continuous Delivery to be resilient by default. You will see how automated resilience testing can be embedded directly into CD pipelines, how progressive delivery limits blast radius when risk is introduced, and how incident signals can trigger autonomous recovery actions such as policy-approved rollback or roll forward. Register
Upcoming Webinars
Thursday, Feb 5, 2026 ET
Tuesday, Feb 10, 2026 ET
Wednesday, Feb 11, 2026 ET
Thursday, Feb 12, 2026 ET
About Data Connectors
Since 1999, Data Connectors has been facilitating relationships between senior executives who are looking for solutions and the vendors who provide them. Our community encompasses more than 650,000 professionals.
We produce this daily curation of industry news and events as a value to our community for free.
Upgrade to a Paid substack subscription to receive additional valuable posts. You will be supporting the community and will allow us to produce this service and to develop additional services.




