Sidebar

New Service Translates Security Risk Exposure for Areas Like Cloud, M&A and Remote Work into Financial Terms

IBM Security today announced a new risk-based service designed to help organizations apply the same analytics used for traditional business decisions to cybersecurity spending priorities. IBM's new Risk Quantification Services creates risk assessments to help clients identify, prioritize and quantify security risk as they weigh decisions such as deploying new technologies, making investments in their business and changing processes.

Read more ...

- Combines IBM's premier technology consulting services with EY leading strategy and business consulting capabilities

- Provides clients with specialized hybrid cloud functionalities including Red Hat OpenShift, as well as IBM Watson, IBM Blockchain, 5G and edge computing technologies

- Dedicated EY professionals with broad experience across IBM's leading technologies to help solve significant client challenges

EY and IBM today announce an enhanced, global multi-year alliance designed to help organizations accelerate digital transformation and improve client outcomes, including leveraging the hybrid cloud capabilities of Red Hat OpenShift, as well as IBM Watson, IBM Blockchain and IBM's 5G and edge technologies. Together, IBM and EY professionals will focus on helping clients modernize and transform their businesses.

Read more ...

Raz-Lee Security has added a ransomware attack simulator to its iSecurity Anti-Ransomware. With this feature, customers can test how their systems would behave during ransomware attacks. Administrators can verify and fine-tune the protection that the product provides.

Ransomware usually runs from a PC. It attacks any data file it can access, including IBM i IFS files.

A few weeks ago, Sapiens, a software developer for insurance, with software for IBM i, was forced to pay a $250,000 ransom in Bitcoin. A published known Ransomware attack on an IBM i made 250,000 IFS files unusable, stopped normal work for a month and cost the organization $200,000 to get the decryption key.

“During this COVID-19 pandemic, ransomware and other cyber-attacks have increased, targeting healthcare, financial, and government organizations. Cybercriminals are looking to take advantage of this global crisis. Now more than ever, it is important to ensure that IT systems are safe,” says Shmuel Zailer, CEO, Raz-Lee Security.

The Anti-Ransomware attack simulator can simulate known ransomware such as Sodinokibi, Ryuk, CryptoLocker, or WannaCry. The attack simulator can also simulate unknown zero-day ransomware that criminals on the darknet are offering as “ransomware as a service”. The attack simulator runs from a PC. It installs quickly and can be reused repeatedly to test various conditions on the IBM i. Simulated attacks are completely safe, but the IBM i sees them as realistic ransomware attacks. With these combined capabilities, organizations can have confidence that their IBM i is well protected.

iSecurity Anti-Ransomware itself runs on the IBM i. Unlike antivirus software, which consumes a lot of CPU and can only report on the damage that an attack has caused, Anti- Ransomware consumes virtually zero resources. It stops ransomware attacks immediately when they start. It can disconnect the IBM i from the network, send an email, alert the SIEM, and shut down the attacking PC.

The new iSecurity Anti-Ransomware is now available. About iSecurity Anti-Ransomware

Anti-Ransomware is a completely independent product. It is part of the iSecurity Advanced Threat Protection (ATP) suite, which also includes Anti-Virus, an ICAP client for the Antivirus, and Object Integrity Validation.

- Global Survey Finds Use of More Than 50 Security Tools Leads to Less-Effective Security Response

- Majority of Organizations Don't Have Specific Plans for Common and Emerging Attacks

IBM Security announced the results of a global report examining businesses' effectiveness in preparing for and responding to cyberattacks. While organizations surveyed have slowly improved in their ability to plan for, detect and respond to cyberattacks over the past five years, their ability to contain an attack has declined by 13% during this same period. The global survey conducted by Ponemon Institute and sponsored by IBM Security found that respondents' security response efforts were hindered by the use of too many security tools, as well as a lack of specific playbooks for common attack types.
Read more ...

X-Force Red Expands Testing Practice to Help Organizations Strengthen Work from Home Security

IBM Security released findings from a study focused on the behaviors and security risks of those new to working from home (WFH) during the COVID-19 pandemic. The study shows more than 80% of respondents either rarely worked from home or not at all prior to the pandemic, and, in turn, more than half are now doing so with no new security policies to help guide them. This shift to working from home has exposed new security risks and has left nearly 50% of those employees worried about impending cyber threats in their new home office settings.

Read more ...

Two thirds of government employees surveyed concerned about cyberattacks on their workplace, threats against elections among top concerns in 2020

IBM Security today released the results of a new poll of U.S. city and state employees which examines their preparedness for dealing with cyberattacks. The study found that 73% of government employees surveyed are concerned about impending ransomware threats to cities across the country, and more employees fear of cyberattacks to their community than natural disasters and terrorist attacks.

Read more ...

Kisco Information Systems (www.kisco.com) today announces Release 7 of its popular iFileAudit security product for the IBM i family of servers. iFileAudit is an audit tool for tracking changes to files in native IBM i databases at the field content level.

New audit tracking information has been added to iFileAudit allowing customers to track the source IP address of the user making a database change, the port number used and the library name for the program that was used to make database the change.

A new option that customer can use to specifically avoid placing any customer data in the QTEMP library has been added. Data in this library cannot be included for encryption purposes and several customers do not want any of their data stored without being encrypted.

Release 7 also supports installation of the software in a customer Auxiliary Storage Pool (ASP) other than the default system ASP. For security reasons, several customers requested this improvement.

Read more ...

More Individualized Approach Helps Optimize Both Security & User Experience

IBM Security today announced it is extending its artificial intelligence (AI) technology originally developed to protect users in the financial services industry, to clients in all industries via the company's identity-as-a-service (IDaaS) offering. IBM Cloud Identity now features AI-based adaptive access capabilities that help continually assess employee or consumer user risk levels when accessing applications and services. The solution escalates suspicious user interactions for further authentication, while those identified as lower risk are "fast tracked" so they can access applications and services they need.

Read more ...