IBM launches AIX-to-cloud app migration program

IBM launches AIX-to-cloud app migration program

IBM has launched the Power Private Cloud (PPC) Rack solution, a converged infrastructure product that migrates on-premises apps running on its POWER9/AIX systems to the cloud. The solution consists of three POWER System S922 servers with 20 CPU cores, 256GB of RAM, and 3.2TB of NVMe local storage, plus a new storage enclosure, the FlashSystem 5200, with a minimum of 9.6TB and a pair of SAN24B-6 switches with 24 Fibre Channel ports. To read this article…

Read More

How to protect backups from ransomware

How to protect backups from ransomware

Ransomware is becoming the number one threat to data, which makes it essential to ensure that bad actors don’t encrypt your backup data along with your primary data when they execute ransomware attacks. If they succeed at that, you will have no choice but to pay the ransom, and that will encourage them to try it again. The key to not having to pay ransom is having the backups to restore systems that ransomware has…

Read More

Yandex Insider Breach Hits Nearly 5000 Inboxes

Yandex Insider Breach Hits Nearly 5000 Inboxes

Russian internet giant Yandex has revealed that thousands of its customers had their accounts accessed due to a malicious insider working at the firm. The Moscow-headquartered multi-national provides search, email, e-commerce and even ride-hailing services, and claims to have tens of millions of unique monthly users. However, on Friday it noted in a brief statement that an employee had been selling access to users’ email accounts for personal gain. “The employee was one of three…

Read More

Police Reportedly Arrest Egregor Ransomware Members

Police Reportedly Arrest Egregor Ransomware Members

French and Ukrainian police have been in action disrupting the Egregor ransomware group with several arrests last week, according to reports. The suspects were traced via analysis of Blockchain records after victims of the ransomware paid their extorters in Bitcoin, according to public radio channel, France Inter. Those arrested in Ukraine are thought to have been hackers as well as individuals providing logistical and financial support to the ransomware-a-service (RaaS) group. The Paris Tribunal de Grande…

Read More

4 reasons ERP data security and privacy should factor into your 2021 security budget

4 reasons ERP data security and privacy should factor into your 2021 security budget

4 reasons ERP data security and privacy should factor into your 2021 security budget | 2021-02-15 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

5 cybersecurity challenges facing healthcare delivery organizations

5 cybersecurity challenges facing healthcare delivery organizations

5 cybersecurity challenges facing healthcare delivery organizations | 2021-02-15 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Innovative security solutions on the market

Innovative security solutions on the market

Innovative security solutions on the market | 2021-02-15 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Common Criteria Certification and Tripwire Enterprise

Common Criteria Certification and Tripwire Enterprise

The Canadian Centre for Cyber Security performs evaluations on common IT products and releases a report called “Common Criteria Certification.” This process allows for organizations to review an evaluation without needing to set up and configure an IT product that they would like to test. Tripwire Enterprise v8.8.2.2 was recently evaluated and passed the certification. How the Certification Process Works The Canadian Common Criteria Scheme provides a third-party commercial Common Criteria Evaluation Facility (CCEF) for…

Read More

Scams Starting on Social Media and Targeting Your Business

Scams Starting on Social Media and Targeting Your Business

Social media is no stranger to scams. However, recent trends show scammers have started to show more aggression toward businesses since the beginning of the pandemic. Being able to recognize these scams can help you prevent injury to your business. Scammers go where the people are. Today, more than half of the world’s population uses some type of social media, according to the Digital 2020: July Global Snapshot. The Pew Research Center’s Social Media Fact…

Read More

Data Risk, Intelligence and Insider Threats

Data Risk, Intelligence and Insider Threats

When it comes to securing networks in today’s business environment, the single biggest challenge firms must contend with is that of the insider threat. While the term is typically associated with corporate espionage or perhaps disgruntled workers, this threat is mostly not caused by malicious actors. The insider threat simply refers to the damage caused by individuals who are granted legitimate access to an organization’s digital infrastructure. Most commonly, the threat of insiders takes the…

Read More
1 57 58 59 60 61 268