article thumbnail

New Ransomware Actor 8Base Rivals LockBit in Extortion

Data Breach Today

Group Listed Nearly 40 Victims on its Dark Web Leak Site So Far This Month New entrant ransomware group 8Base is fast becoming a "big player" in the underground market with nearly 40 victims in June - second only to the notorious LockBit ransomware gang.

article thumbnail

Building for operational resilience in the age of AI and hybrid cloud

IBM Big Data Hub

Organizations in the financial services, healthcare and other regulated sectors must place an even greater focus on managing risk—not only to meet compliance requirements, but also to maintain customer confidence and trust. This includes cyber incidents, technology failures, natural disasters and more. Similarly, in the U.S.

Cloud 80
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SER’s growth double that of ECM market competition

Info Source

In the fiscal year 2017, the SER Group grew more than twice as much as the entire ECM market [1] [1]. One reason for the very positive development is SER’s licensing business, which increased by 25% compared to the previous year. Coinciding with the growth in licensing business, service business has also jumped by over 11%.

ECM 40
article thumbnail

Digital leaders: Driving pace and scale in a dynamic market, part 5 (technology)

CGI

Digital leaders: Driving pace and scale in a dynamic market, part 5 (technology). One of the biggest challenges to becoming a digital business is transitioning from legacy processes and systems to new ways of adopting and managing modern technologies. 67% of organizations are applying analytics to optimize the business.

article thumbnail

Internet Backbone Giant Lumen Shuns.RU

Krebs on Security

based Lumen [ NYSE: LUMN ] (formerly CenturyLink ) initially said it would halt all new business with organizations based in Russia, leaving open the possibility of continuing to serve existing clients there. “The business services we provide are extremely small and very limited as is our physical presence. . Monroe, La.

Military 296
article thumbnail

RSAC insights: Malware is now spreading via weaponized files circulating in data lakes, file shares

The Last Watchdog

However, there’s a third pillar of zero trust that hasn’t gotten quite as much attention: directly defending data itself, whether it be at the coding level or in business files circulating in a highly interconnected digital ecosystem. The zero trust approach to enterprise security is well on its way to mainstream adoption. Srinivasan.

article thumbnail

Enterprise Architecture: Secrets to Success

erwin

M&A, new markets, products and businesses). Emerging Markets : What opportunities align to our business (e.g., operating strategy, global business services and shared services)? Cost Reduction : What can we do to reduce costs while not impacting the business (e.g.,