Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Malware on IBM Power Systems: What You Need to Know

Malware can come from and in a variety of attack vectors. Besides using ‘traditional’ methods of spreading malware, adversaries can leverage more sophisticated methods to turn your Power System into a ‘malware host’. The key target is your data. Data is valuable, and organisations have paid at least $602 million to ransomware gangs in 2021.

$10 million reward offered for information on foreign government-linked malicious hackers

A $10 million reward is being offered for information leading to the identification or location of malicious hackers working with North Korea to launch cyber attacks on US critical infrastructure. The offer comes from the US State Department which is understandably eager to disrupt the activities of hacking gangs linked to foreign governments who may have engaged in espionage, cryptocurrency theft, and other malicious activities.

Introducing the Story Library: Get inspired and start automating your workflows instantly

We are excited to officially announce the launch of the new Tines Story Library - making it easier than ever to unlock the potential for greater business efficiency and more streamlined operations in less time with less effort! The power of no-code automation is now at your fingertips. From interacting with SIEMs to chatbots, case management systems, and more, the Story Library is filled with ready-to-use automation Stories, providing inspiration and digital transformation with just one click.

How Robotic Data Automation Fabric (RDAF) Could Automate Data Pipelines

AI has certainly become the hallmark of digital transformation strategy. According to IDC, global AI spending is forecasted to reach $500 billion in 2024 with a CAGR of 17.5%. Likewise, Gartner predicts low-code application platforms (LCAP), robotic process automation (RPA) and AI are fueling the growth for hyperautomation, and the market will reach $596 billion in 2022, up nearly 24%.

IPFS: The New Hotbed of Phishing

A few months ago, we reported on an interesting site called the Chameleon Phishing Page. These websites have the capability to change their background and logo depending on the user’s domain. The phishing site is stored in IPFS (InterPlanetary File System) and after reviewing the URLs used by the attacker, we noticed an increasing number of phishing emails containing IPFS URLs as their payload.

Thinking about hiring a cybersecurity partner? Keep these considerations in mind

Threats are becoming more sophisticated and the cybersecurity challenges organizations face are growing. Today, one of the biggest risks is hybrid work. According to a Canalys report, 134 million employees worldwide work remotely or under a hybrid model. As we addressed in our Cybersecurity Insights, extending beyond the company office perimeter makes protection a much greater challenge.

Transform Your Hybrid Work Model with SASE

The COVID-19 pandemic has indelibly changed the way we all work. As the world has opened back up and organizations have begun making the return to the office, many employees still want a hybrid work model. In an ideal hybrid working model, employees feel empowered and more productive given the freedom to do their work from any location or device, whenever it’s most convenient. Users need fast, secure access to their data, regardless of where their applications are located.

How to Establish Effective Information System Security Plans

Information ecosystems in the modern era are extremely complicated. Large amounts of data must be sent quickly and securely among thousands of networks’ applications, databases, and servers. That data, particularly sensitive information, should be protected at all costs against potential security incidents.

CIS Implementation Group 1 (IG1): Essential Cyber Hygiene

Cybercrime has become more prevalent since the start of the COVID-19 pandemic. Indeed, 81% of organizations worldwide experienced an uptick in cyber threats and 79% suffered downtime due to cyberattacks during peak season, according to a 2021 report by McAfee Enterprise and FireEye. Attacks have also become more complex. IBM and the Ponemon Institute report that the average time to spot and contain a data breach in 2021 was 287 days, a week longer than in 2020.