Here’s another risk to add to the many issues that business travelers and their organizations must address: juice jacking — a type of cyberattack that involves malicious wall chargers or compromised mobile accessories. Public USB power charging stations are now ubiquitous in the spaces business travelers frequent, including airports, hotels…
Read More
More than 85 percent of companies already operate in multicloud environments and by 2021, 98 percent plan to use multiple hybrid clouds, according to the IBM Institute for Business Value (IBV). After cloud adoption, the application modernization trend follows, with an integral part of it being microservices architecture — decomposing…
Read More
With the California Consumer Privacy Act (CCPA) going into effect on January 1, 2020, I think it’s timely to look at how digital natives may change the way we view data privacy altogether. If you were a toddler when Voyager 1 and 2 buzzed Saturn in 1980 and 1981 respectively,…
Read More
IBM X-Force Incident Response and Intelligence Services (IRIS) researchers have been responding to and analyzing the MegaCortex ransomware since its emergence. MegaCortex’s rapid evolution is one of the ways by which it has adapted to its perpetrators’ goals. While malware does evolve over time, MegaCortex’s evolution has been especially speedy…
Read More