9 out of 10 Canadian organizations bring AI to the mainframe and project billions in increased revenues as a result

Posted in Commentary with tags on September 9, 2025 by itnerd

According to new research from Kyndryl, the world’s largest IT infrastructure services provider, 86% of Canadian organizations have deployed (or are planning to deploy) AI/generative AI to their mainframe environments, and more than a quarter (27%) are projecting a cost savings of more than $25 million as a result. 

Today, Kyndryl released its 2025 State of Mainframe Modernization Survey, which revealed shifting priorities when it comes to the modernization of one of IT’s oldest and most trusted innovations. Mainframes aren’t just surviving the AI era; they’re powering it and unlocking billions in ROI.

Report Highlights: 

  • AI ROI: Globally, organizations anticipate $12.7B in cost savings and $19.5B in new revenue over the next three years as a result of using AI and generative AI in their mainframe environments.
    • In Canada, companies are applying AI for fraud detection, security testing, and performance optimization. Instead of replacing the mainframe, AI is enhancing its capabilities.
  • Shifting strategies: Over the past year, 73% of Canadian organizations shifted their modernization strategies, and half have increased usage or made new investments.
  • Growing skills gaps: Mainframe modernization requires a multi-skilled organization. 64% faced challenges in finding skills talent to effectively modernize the mainframe, with mainframe security skills the most in-demand skill for Canadian organizations.
  • Regulatory influence: 88% of Canadian organizations agree that regulatory compliance is influencing decision-making regarding mainframe modernization, and 43% say it’s increasing collaboration between IT, security and compliance teams.

Why this matters: More than half (61%) of Canadian organizations have at least half of their mission-critical applications residing in the mainframe – its operability is crucial to more than three-quarters (82%) of Canadian businesses. As a result of rapidly changing geopolitical environments, market forces, and regulatory pressures, mainframe modernization has become more challenging and urgent than ever before, and AI could be a catalyst for secure, cost-effective mainframe modernization.

The full report can be found here.

About The State of Mainframe Modernization Survey

Kyndryl commissioned Coleman Parkes Research to survey 500 enterprises that rely on mainframes, in order to gather their insights into how they view mainframe transformation and application modernization. In addition to this online survey, Coleman held a number of qualitative surveys. The study was executed in Q1 FY 2026.

The 500 leaders we surveyed included senior IT decision-makers and line-of-business leaders working in enterprise and mid-market organizations with an average global revenue of USD $3.6 billion. They shared insights into their strategic approach to mainframe modernization projects.

The respondents work for organizations based in North America (26%), Europe (25%), Latin America (25%) and the Asia-Pacific region (24%). They work across 12 industries – including high-tech, banking & financial services, manufacturing, healthcare, retail, insurance, telco & media, oil & gas, automotive, energy & utilities, travel and transportation, and government. 

Rogers Satellite Expands to More Areas Across Canada

Posted in Commentary with tags on September 9, 2025 by itnerd

Rogers today announced the expansion of Rogers Satellite. With the satellite-to-mobile texting service, Rogers now provides three times more coverage than any other Canadian wireless service provider.

Now, when connected to Rogers Satellite, customers can send a text to friends when taking the ferry from Newfoundland to Nova Scotia, fishing off Haida Gwaii or crossing James Bay, with the expansion across bodies of water and along waterways off the Canadian coastline.

In July, the company launched a beta trial open for all Canadians at no cost. Rogers Satellite initially supports text messaging and text-to-911 and will expand to support apps, data and voice services, including 911 voice services. ​ 

Summer network traffic shows Canadians are using the service as they explore some of the country’s most iconic parks and destinations, where traditional cell coverage is not available.

The top destinations for Rogers Satellite usage include Yoho National Park in British Columbia, Banff National Park and Kananaskis Provincial Park in Alberta, Algonquin Provincial Park in Ontario, areas around Mont Tremblant in Quebec and Fundy National Park in New Brunswick.

Among the most remote locations where Rogers Satellite has been used are Telegraph Creek, British Columbia, a community with a population of 51, Brochet, Manitoba, a fly-in community on the shores of Reindeer Lake, and North Twin Island, Nunavut, an Arctic island in James Bay.

Rogers Satellite is available outside, including on bodies of water, where you can see the sky. For coverage areas, see updated coverage map.

Once the beta trial ends in October, Rogers Satellite will be included at no additional cost to customers on the Rogers Ultimate Plan and will also be available for all Canadians for $15/month. Canadians participating in the beta trial will receive a $5/month discount for the first 12 months. 

For more information about the beta trial, visit rogers.com/satellite.

GhostAction Supply Chain Attack Compromises 3,225 Secrets Via GitHub Workflows

Posted in Commentary with tags on September 9, 2025 by itnerd

Researchers have uncovered hundreds of GitHub users and repositories impacted by a supply chain attack in which hackers stole more than 3,325 secrets.

You can read more details here:  https://blog.gitguardian.com/ghostaction-campaign-3-325-secrets-stolen/

Jim Routh, Chief Trust Officer at AI-based identity security and governance solutions provider Saviynt, commented:

“This incident provides cyber professionals with an excellent example of how malicious threat actors can operate at scale by using compromised credentials for accounts that are part of the software supply chain. It is an extended attack surface for cyber criminals given the fundamental changes to software assembly using essential cloud accounts. 

“These types of incidents will (unfortunately) continue until enterprises figure out that identity security is essential when establishing and managing all accounts. That means that your IAM practices must be applied when setting up, configuring cloud and managing (SaaS)  accounts and not leaving it for your software engineers to figure out. The large scale use of tokens by cloud providers offers convenience in authentication which is positive, but extends the attack surface when credentials are easily compromised. 

“Identity security today (and tomorrow) means the application of identity management for the full lifecycle across all types of human and non-human accounts. This starts with ways to identify existing accounts, create a data lake for them and their uses, and uniformly apply identity access management across all enterprise accounts. The majority of enterprises today apply identity security capabilities for accounts provisioned by the operations team but not the engineering teams who need cloud access to assemble software. Until this changes, we will see more cases of compromised credentials used by threat actors impacting the software supply chain. 

“Cloud accounts set up for software engineers represent privileged accounts where privileges need more real time protections. This is the next generation of privileged access management (PAM) to reduce the use of compromised credentials.” 

Supply chain attacks are all the rage right now. Organizations need to take action to ensure that they are not victims of a supply chain attack by doing everything possible to minimize their risk. And I do mean everything possible.

Georgia hospital notified 160k people of year-old data breach that leaked SSNs and medical records 

Posted in Commentary with tags on September 8, 2025 by itnerd

Comparitech reported today that Wayne Memorial Hospital in Jesup, GA over the weekend confirmed it notified 163,440 people of a May 2024 data breach that compromised SSNs, passwords, financial card numbers, medical history, diagnoses, prescriptions, lab results and images, health insurance, state-issued ID numbers, and more. 

We will get back to the why did it take a year to notify these people about the breach part of this in a moment. Right now here’s a comment from Rebecca Moody, Head of Data Research at Comparitech

“This is another worrying case where there has been a significant delay in notifying the majority of people involved in a data breach. Despite having initially notified 2,500 people of a breach in August 2024, it’s taken another year to confirm that over 163,000 people may have been impacted. Furthermore, even though Wayne Memorial Hospital added a data breach alert to its website in August 2024, according to Wayback Machine internet archive data, this had been removed by January 2025. So, unless patients were one of the first 2,500 people to receive a data breach notification letter or happened to view the alert on the hospital’s website from August to December 2024, it’s highly likely they were completely unaware of this breach until now.

While Wayne Memorial Hospital hasn’t confirmed whether or not a ransom was paid, the fact that the hospital was posted on Monti’s website suggests it wasn’t (for the data theft, at least). This means patients’ highly sensitive data has been posted on the dark web since the end of June 2024, leaving them exposed to identity theft and fraud.”

Erich Kron, Security Awareness Advocate at KnowBe4

“A delay of over a year to notify people who have had their information stolen is unfortunate. Every day the information is in the hands of bad actors puts the victims at risk of not only identity theft, but also of scams and other social engineering tactics.

Information such as procedures, dates and insurance information, all stolen along with other data, allow bad actors to contrive stories that can be used to scam victims again, such as convincing the victim that they have outstanding debts related to the procedure, or similar ruses. Having a lot of detailed information can allow attackers to create detailed stories, and unless the victim is aware that the information is available to bad actors, can easily convince the victims of the validity of the scam.

Organizations that handle sensitive data need to ensure they are making every effort to secure it. Since human error is the top way that ransomware and other malware infect organizations, especially through email phishing, these organizations need to have a well-designed human risk management (HRM) program in place.”

The fact that it took a year before people were notified is unacceptable. This hospital really needs to be held to account for this. But I suspect that given the current political climate, that may not happen. But I am free to be surprised.

Hackers hijack npm packages with 2 billion weekly downloads in supply chain attack

Posted in Commentary with tags on September 8, 2025 by itnerd

 In what is being called the largest supply chain attack in history, attackers have injected malware into NPM packages with over 2.6 billion weekly downloads after compromising a maintainer’s account in a phishing attack.

Yikes!

Ensar Seker, CISO at SOCRadar had this to say:

“This incident represents a watershed moment in software supply chain security. The compromise of NPM packages with over 2.6 billion weekly downloads highlights just how devastating upstream attacks can be when they exploit the foundational trust built into open-source ecosystems. Attackers didn’t need to break into servers or bypass technical defenses; they simply hijacked a legitimate maintainer’s account through a targeted phishing campaign. That alone granted them the keys to a vast software kingdom.

What’s particularly dangerous here is how the attackers used a domain that convincingly mimicked a legitimate one, npmjs.help, to socially engineer the maintainer. This wasn’t a spray-and-pray phishing attempt. It was calculated, timed, and executed with a deep understanding of developer psychology. The fear-based tactic of threatening to lock accounts by a specific deadline added urgency, increasing the chance of a successful compromise.

Once inside, the attackers tampered with highly popular libraries like chalk and debug, which are ubiquitous in front-end and back-end stacks across the world. These libraries are not surface-level tools; they sit deep in dependency trees, often pulled into projects silently via transitive dependencies. That’s what makes this breach so insidious. Developers and CI/CD pipelines rarely question dependencies that come pre-vetted from trusted registries. Malicious code embedded in these packages can bypass traditional static security checks and propagate downstream at incredible scale.

The software industry is facing a reality where dependency hygiene is no longer optional. When a single compromised maintainer account can poison a global software supply chain, organizations must rethink what software trust means. This starts with strong identity protection for maintainers, including mandatory hardware-based two-factor authentication, anomaly detection, and continuous monitoring of commit behaviors.

Organizations must also start treating their dependency trees as living assets that require governance, not just during development but throughout the entire software lifecycle. A software bill of materials (SBOM) is now essential. It’s no longer enough to know what code you wrote, you need to know what you inherited. Continuous validation of the packages that flow into build pipelines, coupled with deterministic dependency resolution and runtime behavior monitoring, is critical for defense.

This event also underscores a broader issue. We often assume open-source software is secure because it’s open, but that openness means nothing if identity controls are weak, if changes go unreviewed, and if package provenance isn’t verified. Security must now follow the code from origin to runtime, not just within corporate networks, but across global ecosystems.

I believe we will see more targeted phishing attacks against popular open-source maintainers in the future. This won’t be the last time. The question is how fast our tooling, our governance, and our development practices can adapt to match the evolving threat landscape.”

Roger Grimes, Data-Driven Defense Evangelist at KnowBe4:

“Is this the thousandth time NPM packages have been compromised this decade? What’s the over/under on that number? Can’t be that much. The idea that maintainers are still not using phishing-resistant MFA to protect their maintainer accounts is so, so not understandable. Cybercriminals want to compromise NPMs and do so all the time. And yet, maintainer after maintainer don’t get and use phishing-resistant MFA! It’s like almost asking to be hacked. I’m going to put most of the blame on the majority of the cybersecurity industry that tells people they must use MFA and doesn’t tell them that 85% to 95% of the MFA being used is as phishable as the extremely hackable login name and password they replaced with their weak MFA. And to every cybersecurity expert and guide that says, “You should be using MFA” and not “You must be using phishing-resistant MFA (like FIDO, Yubikeys, passkeys, etc.)” you’re doing a HUGE disservice to your congregation. You are contributing to the problem. Both need to change their ways.”

This illustrates the fact that the way software is built needs to be changed. Developers need to assume that anything that they use from the open source world or anywhere else is suspect until proven otherwise. And they need to keep track of what they use so that if the worst happens, there’s a paper trail of sorts.

Deepgram and AWS to Present Live Webinar: “Building AI Voice Agents with Deepgram + AWS Bedrock” 

Posted in Commentary with tags on September 8, 2025 by itnerd

Deepgram is joining with Amazon Web Services (AWS) to present a live webinar titled, “Building AI Voice Agents with Deepgram + AWS Bedrock” tomorrow, Tuesday, September 9, 10:30 AM – 11:30 AM PDT.

​Deepgram’s Voice Agent API brings lightning-fast speech-to-text and lifelike text-to-speech together with event hooks and speaker diarization, all in real time. Amazon Bedrock gives you instant access to leading foundation models like Claude and Titan, with built-in safety, compliance, and flexibility, perfect for powering voice agents with real intelligence. ​​

Attendees will learn how to build scalable, responsive AI voice agents that actually work in production.

What You’ll See & Learn:

  • ​Build & Deploy in Minutes – See how Deepgram’s streaming API and Bedrock’s managed LLMs make real-time, voice-driven agents possible without stitching together brittle services.
  • ​Smarts + Speed in Action – Watch a live demo that showcases accurate transcription, rapid LLM responses, and the power of few-shot or RAG-based responses, all with sub-second latency.
  • ​Enterprise-Ready Architecture – Learn how to deploy with VPC, IAM, encryption, and autoscaling, all while controlling cost and optimizing performance.

Learn more and register here: https://luma.com/d3qf3t8s, or I would be happy to get you signed up to attend.

OVHcloud unveils Public VCF as-a-Service, an innovative managed VMware solution, tailored for SME

Posted in Commentary with tags on September 8, 2025 by itnerd

 OVHcloud today announces Public VCF as-a-Service, a game-changing managed VMware solution designed to help small and medium-sized enterprises (SMEs) and managed service providers (MSPs) modernize their VMware deployments while keeping control of their costs.

A fully managed VMware solution built on VMware Cloud Director

In a context of change and uncertainties, OVHcloud Public VCF as-a-Service addresses the needs of VMware users globally, through a solution leveraging shared hardware to offer VMware functionality with the best performance/price ratio. With licensing and cloud spending being a major concern for every IT decision maker, OVHcloud Public VCF as-a-Service pricing starts as low as $496 /month. It is built on VMware Cloud Director (VCD) and offers unmatched performance and security for a fully managed VMware solution, while remaining scalable.

Designed with SMEs, SMBs and MSPs in mind, the Public VCF as-a-Service solution offers a hassle-free modernization of existing VMware workloads, ensuring small businesses can continue to leverage their long-standing VMware investments. Organizations can quickly deploy their cloud in a scalable VMware environment or seamlessly migrate their existing VMware workloads (SDDC/VCD) in a trusted cloud infrastructure providing continuity, performance and simplicity.

To meet the evolving needs of businesses, Public VCF as-a-Service offers a streamlined approach, allowing users to access only the necessary components, without the complexity of the full VMware suite while remaining easily manageable. A number of essential tools are provided to complement Public VCF as-a-service such as a library of pre-configured images to make deployments a breeze and a managed backup solution powered by Veeam. New features will be rolled-out throughout the months to support Public VCF as-a-Service, ensuring it remains a cutting-edge solution.

OVHcloud, a Broadcom Pinnacle certified partner, offers with Public VCF as-a-Service a no compromise solution when it comes to security, resilience and ease of use. With a 99.95% SLA and resilient architecture, customers can trust that their VMware deployments are always available and secure.

Adjustable resource allocation and unmetered guaranteed bandwidth

OVHcloud Public VCF as-a-Service starts with a pack of 16vCPU and 64 GB of RAM. Users can dynamically allocate theses resources between VMs, and scale the capacity as needed through additional packs, ensuring greater cost efficiency based on their current needs.

OVHcloud Public VCF as-a-Service benefits from up to 5 Gbps guaranteed and unmetered public bandwidth and up to 5 Gbps of unmetered private bandwidth, further participating in guaranteeing predictable pricing.

Data protection and sustainability

OVHcloud Public VCF as-a-Service benefits from OVHcloud’s well-known expertise in infrastructure, offering a trusted Cloud in environmentally friendly datacenters. With the highest security and data protection standards in the form of ISO 27001 certification, customers benefit from a trusted cloud. OVHcloud datacenters take advantage of the Group unique industrial model with a watercooling system that contributes in best-in-class PUE/WUE indexes (see more data here).

Pricing & Availability

OVHcloud Public VCF as-a-Service starts at $469 monthly with 16 vCPU, 64 GB of RAM and 1 TB of storage. It is available now in Canada, Europe and the United States of America.

iCloud Calendar Spam Is Back With A Crypto Twist

Posted in Commentary with tags on September 8, 2025 by itnerd

iCloud Calendar Spam has been a thing for a while now. And lately it has resurfaced in a big way. Spammers have been sending calendar invitations containing links, most of them taking the form of cryptocurrency scams. And the big problem with this is that email filters and other security measures that are in place to stop scams from hitting your calendar or inbox are completely bypassed. Thus making it far more likely that there will be victims.

Bleeping Computer has a story on this: https://www.bleepingcomputer.com/news/security/icloud-calendar-abused-to-send-phishing-emails-from-apples-servers/

Javvad Malik, lead security awareness advocate at cybersecurity company KnowBe4, commented:

“There is an ongoing trend of phishing that rides on reputable services. These attacks, such as the one using iCloud Calendar pass SPF/DKIM/DMARC, and land in inboxes with borrowed legitimacy. People don’t scrutinize calendar links the way they do email links, so a meeting invite with a callback number lowers defenses and funnels victims into vishing or remote‑access scams.

“KnowBe4 Threat Labs has been tracking the same pattern (https://blog.knowbe4.com/phishing-deep-dive-eu-affiliated-survey-platform-exploited-in-sophisticated-credential-harvesting-campaign) of attackers launching campaigns through legitimate platforms AppSheet, Microsoft, Google, QuickBooks, even Telegram which bypass native and SEG controls.

“Don’t just hunt for misspellings and spoofed domains, look at the intent. Ask if this communication was expected, is it trying to spike emotion, and is there an artificial time limit pushing you to act now? If the answer is yes to any, stop and self‑verify via a known channel. And treat calendar invites with the same scepticism as email.”

Apple has a video that addresses this topic that you should look at if get hit by this. But Apple needs to figure out a way to stop this from being an issue in the first place. Maybe with this new wave of spam, they might put some effort and resource into finding a solution.

Review: EnGenius ECW520 WiFi 7 Access Point

Posted in Products with tags on September 8, 2025 by itnerd

What if I told you that you could get the following access point with the following specs for just $189 USD:

  •  5,800 Mbps on 6 GHz
  • 4,300 Mbps on 5 GHz
  • 700 Mbps (2.4 GHz)
  • 2.5 GbE port with PoE++ support
  • 2×2 MIMO suppor

You may think that’s not possible. But it is possible as EnGenius has done this with the ECW520. Here’s a look at it:

EnGenius has brought an access point that is on the slim side, as well as having rounded edges. Thus for those who care about design, this access point will likely fit in with any office decor.

Underneath is a 2.5 GbE port with PoE++ support. Which is great as one cable will give you fast uplink/downlink as well as power. I should note that this does not come with a power adapter. Though it does have a 12V barrel jack and EnGenius does sell a power adapter for the three people on Earth who would need that.

Setting things up is laughably easy via the EnGenius Cloud app which is available for iOS and Android. Anyone can get it set up and running in under 10 minutes which is another plus for this product.

But here’s the real question. How fast is this? Well I had to borrow some WiFi 7 devices to properly test this as I don’t run anything with WiFi 7 at the moment. But once I secured said devices and ran my testing, here’s what I got.

  • 1 Meter from the access point: 1.9 Gbps per second
  • 5 Meters from the access point: 1 Gbps per second
  • 10 Meters from the access point: 680 Mbps per second

All of this was within line of sight of the access point. If I compared it to the ECW526, it’s somewhat slower than that access point. But not by enough for me to care. Especially since the ECW526 is a whole lot more expensive. For my clients who are looking to get access points, the ECW520 may be my go to in terms of what I recommend. The price is right and the speed is better than good enough as far as I am concerned. Plus the setup is easy enough that anyone who buys one or more of these won’t have to pay someone like me to set them up. Just get an electrician to string up PoE to the right places and you’re good to go.

Posted in Commentary with tags on September 5, 2025 by itnerd

 Researchers have discovered that cybercriminals have orchestrated a sophisticated phishing campaign using Simplified AI, a legitimate AI marketing platform, to steal Microsoft 365 credentials from the U.S.-based organizations.

During the phishing campaign, threat actors hosted a phishing webpage under the legitimate Simplified AI domain, blending malicious activity into the daily noise of enterprise traffic. By impersonating an executive from a global pharmaceutical distributor, the threat actors delivered a password-protected PDF that appeared legitimate. Once opened, the file redirected the victim to Simplified AI’s website, but instead of generating content, the site became a launchpad to a fake Microsoft 365 login portal designed to harvest enterprise credentials.  

This social engineering combined with phishing highlights a dangerous evolution: threat actors are merging impersonation with sophisticated phishing techniques while exploiting the era of AI adoption in enterprise organizations. They are no longer relying on suspicious servers or cheap lookalike domains. Instead, they abuse the reputation and infrastructure of trusted AI platforms. These are platforms your employees already rely on, or that your security team may implicitly trust, allowing threat actors to bypass defenses and slip into your organization under the cover of legitimacy. 

Javvad Malik, Lead Security Awareness Advocate at KnowBe4, providing the following commentary:

“We’re seeing attackers piggyback our own shortcuts. If a link lands on a whitelisted AI platform everyone already uses, it feels safe. In a busy world, while many are multi-tasking, it’s easy to see branding, a familiar layout, and a PDF and lower their defenses. That’s precisely what this attack is seeking to do.”

“It’s why we need to treat AI platforms like any other third-party app. We should use them, but verify. Turn on phishing-resistant MFA so a stolen password doesn’t result in a breach. Be wary of password-protected attachments, reporting them to IT or Security teams to inspect if unsure. Keep an eye on which AI apps and OAuth consents your teams are actually using. And if an email nudges you to log in somewhere new, pause and verify before you type a single character.”

This is pretty scary as this would be pretty hard to detect. It just shows how threat actors are evolving to make their attacks more effective. And it means that in response we need to find and implement new and stronger defenses to ensure that threat actors don’t win.