ransomwaresecurity (1)

In part one of this blog James Cockayne looked at what might happen to a DB2 database that was attacked by ransomware encryption.  

In part two James shares four dos and four don’ts to help protect DB2 databases from ransomware attacks.

https://www.triton.co.uk/ransomware-and-the-db2-database-part-two/

9860513277?profile=RESIZE_710x

Read more…

astorino_steven: Read my new blog post: Learn how to kickstart your data fabric initiatives with new Express and Quickstart offerings. Address your most pressing pain points first – and expand your data fabric capabilities as and when needed. #DataFabric #IBM #AI

astorino_steven: Our flexible and fast AI-powered #PlanningAnalytics solution forecasts accuracy and consistency allowing businesses real-time insights - without the spreadsheet. IBM Planning Analytics is now available as a Service on AWS. #IBM #BusinessAnalytics #AWS

astorino_steven: #DataGovernance is an important step in any organization’s data strategy. Establishing policies, procedures, and standards for managing data ensures that data is being used in a way that is consistent with the businesses goals and values. #Data #IBM