ITNE: Security, CRM, Call Centers, Cloud, Salesforce, Fortinet, CrowdStrike, Webinars (328.3.6) Wednesday PM
Volume 328, Issue 3: Articles Posted Week: Jul 14th, 2025 — Jul 21st, 2025
IT News You Can Use - Full Weekly Issue - Vol 328 Issue 3
Security
It Seems Even DNS Records Can Be Infected With Malware Now - Here's Why That's A Major Worry
What Is Exposure Management? A New Blueprint For Modern Cyber Defense
CRM
Call Centers
Cloud
Cloud Architect Details How To Build A Database Security Playbook
IT Leaders Find Quick Wins When Adapting Cloud Strategies To Gen AI
Salesforce News
Fortinet News
CrowdStrike News
Stop Remote Ransomware Attacks with Falcon Endpoint Security
CrowdStrike sees cybersecurity innovation hitting warp speed with agentic A
Join this complimentary Gartner IT webinar as a Gartner expert presents the key behaviors CIOs and executives should build and grow to boost their C-suite performance. You will walk away from this session with answers to your vital questions, a copy of the research slides and recommended actions to help you achieve your goals. Register
Security
It Seems Even DNS Records Can Be Infected With Malware Now - Here's Why That's A Major Worry
Crooks found a way to break up malware and hide it on DNS servers...more
An Explanation Of Identity And Access Management
In this video, Informa TechTarget customer success specialist Ben Clossey explains what identity and access management is and best practices that organizations should be following....more
What Is Exposure Management? A New Blueprint For Modern Cyber Defense
Most of us are familiar with the concept of vulnerability management. But in recent years we've heard newer terms like cyber exposure, continuous threat exposure management (CTEM) and the more-encompassing exposure management....more
Experts Unpack The Biggest Cybersecurity Surprises Of 2025
2025 has been a busy year for cybersecurity. From unexpected attacks to new tactics by threat groups, a lot has caught experts off guard. We asked cybersecurity leaders to share the biggest surprises they've seen so far this year and what those surprises might mean for the rest of us....more
CRM
CRMs Are Not Just Tools - They Are Becoming Operating Systems
In the past, CRMs primarily handled basic tasks such as contact storage and sales tracking. Fast forward to now, and they've become essential tools that power everything from marketing to customer support....more
Attendees will learn how these intelligent agents can boost productivity, enhance customer experience, and streamline information access while leveraging the full flexibility of edge-to-cloud AI infrastructure. Register
Call Centers
How Is AI Transforming Customer Service And Support
The Role of AI in Revolutionizing Customer Service Through Automation, Personalization, and Efficiency...more
Cloud
Cloud Architect Details How To Build A Database Security Playbook
Cloud architect Joey D'Antoni breaks down a six-part framework for building a resilient database security playbook across AWS and Azure. From access reviews to incident drills, here's how to lock down your most critical cloud assets....more
When Cloud Security Becomes An Architecture Problem
Cloud-native systems were supposed to make everything faster and more secure. Instead, many organizations find themselves managing increasingly complex environments where security responsibilities are scattered across teams, tools, and platforms that don't communicate well with each other....more
IT Leaders Find Quick Wins When Adapting Cloud Strategies To Gen AI
Where and how you process data can make or break your gen AI initiatives....more
Salesforce News
Don't Let Sensitive Data Hide in Your URLs
Protect your org and users by keeping sensitive info out of sight....more
Fortinet News
Improving Cloud Intrusion Detection and Triage with FortiCNAPP Composite Alerts
Detect Cloud Intrusions Faster with Correlated Alerts and Contextual Timelines in FortiCNAPP...more
NailaoLocker Ransomware's 'Cheese'
Built-In Decryption or Just Another Trap?...more
CrowdStrike News
Stop Remote Ransomware Attacks with Falcon Endpoint Security
Ransomware is evolving fast - and remote encryption attacks outpace legacy defenses. CrowdStrike Falcon Prevent includes File System Containment, a feature that automatically blocks ransomware at the file access level, even when the attack originates from unmanaged systems...more
CrowdStrike sees cybersecurity innovation hitting warp speed with agentic A
Cybersecurity innovation is entering a pivotal phase as artificial intelligence transforms how organizations detect, prevent and respond to threats....more
Join us for a deep dive into VMware Cloud Foundation 9.0, the latest innovation in private cloud from Broadcom. In this Tech Field Day Showcase, Broadcom experts will explore what's new in VCF 9.0 and share best practices for successful adoption and deployment. Register