james cockayne (1)

By James Cockayne

By now I’m sure everyone has heard of the malicious practice known as ransomware attacks, where miscreants break into a corporate network and encrypt data before demanding huge sums of money to provide a method to decrypt that data and make it accessible again.  The attacks tend to be insidious – sometimes the attacker is in the network for months before they gain access to the systems they are interested in, and they are known to target backup servers as well as the primary systems to cause maximum inconvenience to the target organisation. 

Find out what an attack on a DB2 Database would look like. Continue reading James Cockayne's latest blog. 

https://www.triton.co.uk/ransomware-and-the-db2-database-part-1/

 

 

Read more…

astorino_steven: Read my new blog post: Learn how to kickstart your data fabric initiatives with new Express and Quickstart offerings. Address your most pressing pain points first – and expand your data fabric capabilities as and when needed. #DataFabric #IBM #AI

astorino_steven: Our flexible and fast AI-powered #PlanningAnalytics solution forecasts accuracy and consistency allowing businesses real-time insights - without the spreadsheet. IBM Planning Analytics is now available as a Service on AWS. #IBM #BusinessAnalytics #AWS

astorino_steven: #DataGovernance is an important step in any organization’s data strategy. Establishing policies, procedures, and standards for managing data ensures that data is being used in a way that is consistent with the businesses goals and values. #Data #IBM