Tag Archive for: IBM

IBM FlashSystem update focuses on ransomware detection


IBM is looking to detect ransomware in storage as early as possible by adding AI to its primary storage offering, reducing recovery time objectives.

In the latest update of its FlashSystem primary storage device, IBM made changes to both its primary storage hardware and Storage Defender software. FlashCore Modules, flash storage it uses in place of SSDs, are now in their fourth generation and provide extra computation to power an analysis of I/Os. IBM Storage Defender, primary and secondary data protection software, will now use low-powered AI sensors to search for anomalies.

In storage, ransomware detection is often relegated to backup software and products. But data resiliency and data protection is everyone’s job, according to Scott Sinclair, an analyst at TechTarget’s Enterprise Strategy Group. The responsibility stretches beyond the cybersecurity team or the backup team to all parts of the IT stack.

“The storage team needs to prioritize data protection,” he said. “The faster you can identify an issue, the faster you recover, the better off you are.”

Security in the media

FlashCore Modules look like traditional 2.5-inch SSDs but have more Arm-based cores and a field-programmable gate array, a configurable device to meet desired requirements, that turns the modules into computational storage devices, according to Sam Werner, vice president of storage product management at IBM. The modules use quad-level cell NAND but can perform at a faster, triple-level cell performance at a lower cost, he said.

The additional Arm cores provide the FlashSystem with extra computation to conduct an analysis of I/Os and look for anomalies, Werner said. This means the FlashCore Modules can detect ransomware on the flash itself, in under a minute, he added. When data is stored using flash technology, it is not updated but is instead rewritten somewhere else in the media, with a second copy existing for a short period of time. Ransomware detection can now analyze one copy outside the data path, without slowing performance.

Tools such as AI detection in primary storage can help organizations fight against ransomware, according to Sinclair. These attacks will continue and increase in…

Source…

Cyber Warfare Market 2029 | Raytheon, BAE System, IBM – The Knox Student


Cyber Warfare The cyber warfare market embodies the convergence of cybersecurity, geopolitics, and digital conflict, offering technologies that defend against and engage in cyber attacks on digital infrastructures. Cyber warfare encompasses a range of offensive and defensive strategies, from protecting critical systems against hacking to leveraging digital tactics in military operations. This technology enhances national security, economic stability, and the safeguarding of sensitive information in an increasingly interconnected world. The market’s significance lies in its contribution to shaping the modern battlefield, where digital sovereignty and information control are integral components of defense strategies. As digital vulnerabilities grow and cyber threats evolve, the cyber warfare market strives to develop advanced threat detection, rapid response mechanisms, and interdisciplinary approaches that transcend traditional notions of warfare and redefine the frontlines of security.

Statsndata published a report on the process of collecting, analyzing and interpreting Cyber Warfare Market data. This helps companies better understand the market, identify customer needs and preferences, and assess it-telecom industry competition. New published reports on companies to collect, analyze and interpret Cyber Warfare market data.

Get a sample report:https://www.statsndata.org/download-sample.php?id=7617

It provides an overview of the market including definition, applications and development, manufacturing technology. This Cyber Warfare market research report tracks all the recent developments and innovations in the market. It provides data on obstacles encountered while growing your business and provides advice on how to overcome upcoming challenges and obstacles.

Some of the major companies influencing this Cyber Warfare market include:

Lockheed Martin
Airbus
Raytheon
BAE System
IBM
DXC Technology
Intel
General Dynamic

This Cyber Warfare research report sheds light on the major market players who are thriving in the market. Track business strategy, financial status and upcoming products.

Cyber Warfare Market research was conducted using a variety of methods. These methods include surveys,…

Source…

How IBM and Cloudflare are Collaborating to Mitigate Bot-Based Security Threats


How IBM and Cloudflare are Collaborating to Mitigate Bot-Based Security Threats


By Nataraj Nagaratnam | CTO, IBM Cloud Security, IBM

August 08, 2023

Across the globe, organizations are expanding their hybrid cloud environments to meet their transformation goals. These modernization efforts can support partnership ecosystems, supply chain demands, and other objectives, but they also have the potential to increase security and compliance concerns. According to IBM’s 2023 Cost of a Data Breach Report[1], 95 percent of the surveyed organizations studied have had more than one data breach.

To continue addressing the ever-changing threat landscape, IBM’s expanded offering in collaboration with Cloudflare, the Internet security, performance, and reliability company running one of the world’s largest and most interconnected networks today, is now available to Enterprise Premier Plan users. In 2018, IBM first introduced IBM Cloud Internet Services’ (CIS), powered by Cloudflare. This offering allows IBM Cloud customers to configure mission-critical web and application performance and security solutions to help them combat critical security challenges such as with Distributed Denial-of-Service (DDoS) mitigation and data theft protection. Both IBM and Cloudflare continue to have a mission of delivering solutions that will address these potentially costly security threats, without hindering Internet speed or business innovation.

“With the rise of DDoS attacks and data theft, it’s become important to have a provider that helps us meet the challenges of the ever-changing threat landscape. That’s why at Liquid Reply, we have called on IBM Cloud and Cloudflare to help support our security initiatives,” said Davide Sarais, IT Lead at Liquid Reply. “By using IBM Cloud Internet Services, we’ve been able to maintain our compliance posture t. The new features that are available to IBM and Cloudflare clients are exciting advancements that we hope will take our approach to security to the next level.”

New Offering: Cloudflare Bot Management on IBM Cloud Internet Services

As malicious bot attacks become more sophisticated and manual mitigations…

Source…

Cyber attacks against health providers on the rise: Trustwave, IBM


2. ChatGPT, other large language models will make certain attacks harder to identify.

Generative artificial intelligence is the capability of algorithms to automatically generate content from user queries such as text, video and images. It’s also a potential threat to data security, according to the Spiderlabs report.  

While many companies have already begun investing in their own models, there were initial fears large language models would begin writing malicious code. That threat hasn’t yet fully materialized because the models require someone ro first understand how to code before the models produce malicious results, Sigler said.

But Sigler said AI is making it harder for employees to identify phishing scams or malicious emails. 

“When you have an AI engine that speaks that language natively, and understands exactly what you’re trying to say, that becomes a lot more compelling,” Sigler said. “Those red flags, those grammatical errors, those spelling errors tend to disappear.”

The report also said healthcare systems may face an increased risk of exposure due to their reliance on third-party vendors that may incorporate generative AI into their products. 

3. Healthcare lacks accurate inventory of devices.

The increased number of connected devices in healthcare further amplifies the vulnerability of the industry’s infrastructure, the report’s authors said. Devices ranging from an employee’s cell phone to medical equipment are all at risk. 

Sigler said many providers don’t have an accurate inventory of connected devices.  

“I see that as the biggest problem,” Sigler said. “Having a current, proper and ongoingly updated inventory of what you have, and how valuable they are to your organization…is going to help you prioritize the security controls you’ve put in place.”

Once an organization has an accurate inventory, Sigler said organizations should prioritize issuing a value to each area of data. Clinical data, for example, would likely have more controls and greater value within an organization than website analytics or marketing email lists.

“I think a lot of people just put the cart in front of the horse,” Sigler said. “They start setting up…

Source…