First identified in late July, and automated hacking attack has deleted data from over 4,000 unsecure databases. The targets of these ongoing hacking attacks are unsecured Elasticsearch, MongoDB, and Redis databases. There has yet to be any ransom demands made, so it appears these attacks were specifically designed to delete all data. These threats are being called Meow Attacks because they leave a “meow” signature on server log files.Read More
The enormous amount of energy that needs to be consumed to power the world’s ever-increasing collection of data centers has been an open secret for a while now. While The Cloud is often advertised as this omnipresent and weightless concept, its implementation results in a significant real-world impact of the cloud on the environment. Due to the massive energy consumption needed to store the world’s data, cloud storage negatively impacts the environment, contributing a large share of the fossil fuels released into the atmosphere.
In their recently published annual global data center survey, the Uptime Institute found that the majority of IT loads are still run on privately-owned enterprise data centers.1 Data center workloads are not only getting extensive but are also getting more complex.
Cybercrime is a growing field for criminals, organized crime syndicates, and corporate espionage agents. In fact, many of the world’s top business leaders, including IBM Corp’s Chairman and CEO Ginni Rometty, point to cybercrime as the greatest threat to today’s businesses.1 Recent cybercrime statistics support that statement. In 2019, the cost of cybercrime and data breaches to the global economy is projected to reach $2.1 trillion.2
With the ongoing threat of hackers, malware, and data breaches still looming over businesses in every industry and operating in all sectors, investment in cybersecurity is at an all-time high and continues to grow.
Research by Gartner points to worldwide spending on cybersecurity to increase by 8.7% to over $124 billion in 2019.1 Still, cybercriminals have continued to carry out successful attacks, hacking into servers, stealing valuable user data, and infecting networks with ransomware.