PKI Solutions Announces First and Only Vendor-Agnostic Solution for HSMs

Posted in Commentary with tags on March 6, 2025 by itnerd

 PKI Solutions is excited to announce a significant advancement in cryptographic security management: PKI Spotlight’s Multi-HSM Monitoring, the industry’s first, and ONLY, vendor-agnostic solution for Hardware Security Modules (HSMs). For the first time, organizations can gain unified, real-time visibility into both nCipher (Entrust) and Luna (Thales) HSMs, including on-premises and cloud-based deployments (Luna DPoD and nCipher HSM as a Service).

In an era where enterprises operate with increasingly complex and diverse cryptographic infrastructures, PKI Spotlight addresses a critical need—ensuring seamless monitoring, availability, and compliance for HSMs from multiple vendors. Previously, organizations had to rely on disparate, proprietary monitoring tools, resulting in operational silos and limited visibility. Now, with PKI Spotlight’s latest innovation, security teams can monitor HSM availability, configurations, and usage through a single, intuitive interface without needing to provide credentials for your HSMs.

Key Benefits of PKI Spotlight’s Multi-HSM Support:

  • Real-Time HSM Monitoring: Track the operational status of nCipher and Luna HSMs instantly, receive immediate alerts for any failures, and proactively address performance issues.
  • Configuration & Firmware Oversight: Maintain compliance by monitoring firmware versions and configuration settings and identifying inconsistencies that could pose security risks.
  • Partition Utilization Insights – Optimize resource allocation by gaining deep visibility into partition usage to ensure efficient cryptographic operations.

Gartner recognizes PKI Spotlight as the only PKI posture management solution on the market. It continues to lead the way in enterprise security innovation. While some HSM vendors offer proprietary monitoring tools, PKI Spotlight is the only commercial solution to bridge the gap between monitoring multiple HSM vendors, delivering unparalleled visibility and control.

Organizations looking to enhance their HSM strategy can experience the power of PKI Spotlight firsthand. Request a demo today and discover how real-time monitoring and actionable insights can transform your cryptographic security operations.

Comparitech Has A Ransomware Roundup: A short but busy February

Posted in Commentary with tags on March 6, 2025 by itnerd

Comparitech researchers have published a ransomware roundup for the month of February. Although it may be the shortest month of the year, February 2025 actually turned into one of the busiest months for ransomware attacks over the last year or so. 

Key findings include: 

  • 959 attacks in total — 41 confirmed attacks
  • Of the 41 confirmed attacks:
    • 20 were on businesses
    • 8 were on government entities
    • 7 were on healthcare companies
    • 6 were on educational institutions
  • Of the 918 unconfirmed attacks:
    • 824 were on businesses
    • 11 were on government entities
    • 40 were on healthcare companies
    • 21 were on educational institutions
  • The most prolific ransomware gangs were Clop (323), RansomHub (95), Akira (80), Play (47), and Qilin (43). RansomHub and Qilin had the most confirmed attacks out of these claims with six and four, respectively

For full details, the study can be read here: https://www.comparitech.com/news/ransomware-roundup-february-2025/

Outpost24 Research on Multi-Stage EncryptHub Malware Campaign

Posted in Commentary with tags on March 6, 2025 by itnerd

Outpost24’s KrakenLabs has released research on a new EncryptHub multi-stage malware campaign.

While previous reports have begun to shed light on the operation of this rising criminal entity, Outpost24’s KrakenLabs investigation has gone a step further, uncovering previously unseen aspects of their infrastructure, tooling, and behavioral patterns.

Through a series of operational security (OPSEC) missteps, EncryptHub inadvertently exposed critical elements of its ecosystem, allowing Outpost24 to map their tactics with unprecedented depth.

Their lapses include directory listing enabled on key infrastructure components, hosting stealer logs alongside malware executables and PowerShell scripts, and revealing Telegram bot configurations used for data exfiltration and campaign tracking.

These mistakes provided a unique vantage point into their operations, enabling Outpost24’s researchers to dissect their attack chain and methodologies in ways that have not yet been publicly detailed.

You can read the research here.

Sam Erdheim Appointed as Head of Marketing at Radiant Logic

Posted in Commentary with tags on March 6, 2025 by itnerd

 Radiant Logic has announced the appointment of Sam Erdheim as the company’s new Head of Marketing. In this role, Erdheim will leverage his extensive experience in cybersecurity and enterprise software marketing to drive brand awareness, demand generation and strategic growth. 

With over 20 years of experience in marketing and product management, Sam Erdheim brings a wealth of knowledge to Radiant Logic. He has held marketing leadership roles at GuidePoint Security, Fidelis Security, and AlgoSec. Erdheim is widely recognized for his expertise in developing and executing marketing strategies that align with organizational goals, particularly in the fast-evolving cybersecurity and technology sectors.

In his new position, Erdheim will oversee all aspects of Radiant Logic’s marketing efforts, from digital and content marketing to public relations and brand positioning. He will work closely with the executive team to enhance customer engagement, improve go-to-market strategies, grow channel partnerships and further solidify Radiant Logic’s position as a leader in the identity security posture management space.

To learn more about Radiant Logic’s new Head of Marketing, visit: https://www.radiantlogic.com/blog/radiant-logic-welcomes-sam-erdheim-as-head-of-marketing/

Canada’s Digital Workplace Maturity Trails Global Peers, Raising Security and Productivity Concerns Says Zoho

Posted in Commentary with tags on March 6, 2025 by itnerd

Zoho Corporation today announced the findings of its “Trends in Digital Workplace Transformation” study, which surveyed 4,900 employees globally to assess their businesses’ digital workplace transformation (DX) maturity. The survey also included 300 Canadian respondents. 

The Zoho Workplace team developed a comprehensive digital workplace transformation maturity model as part of the survey methodology that measured two key areas: workplace indicators (digital tools and processes) and employee performance indicators (productivity, collaboration, and security preparedness). 

The study reveals that Canadian businesses are falling behind globally, with productivity weaknesses and slow tool adoption hindering progress. The report, based on survey data across multiple industries and company sizes, finds that 40% of Canadian organizations are stuck at an early transformation stage, while top-performing global counterparts move ahead. 

Process Inefficiencies Bring Down Canadian Digital Transformation Maturity 

The study ranks Canadian digital transformation maturity at 59.9%, below the global average of 62.2% and second-to-last when compared to other regions including India (64.6%) and Asia (63.2%) which have the highest maturity levels. The U.S. average score is 61%.  

Despite access to digital tools, limited integration, weak security protocols, and inefficient workflows are preventing companies from reaching higher digital workplace transformation maturity. 

  • Manual task delegation: 85% of companies still rely on manual task delegation over automation.  
  • Sector struggles: Hospitality (56%), logistics (53%), and retail (58%) fall behind tech (66%) and finance (62%). 
  • Company size matters: Small and medium businesses (58%) lag behind larger firms (63.5%). 
  • Unmet expectations: Only 15% of employees feel workplace tools fully meet expectations 

Key Security Gaps Fuel Vulnerabilities 

Many Canadian businesses remain vulnerable due to weak security measures and lack of awareness, according to the study. While larger enterprises and tech firms have made strides in security adoption, small businesses, remote teams, and customer-facing roles continue to face high risks. 

  • Only 46% of Canadian businesses enforce multi-factor authentication (MFA), biometrics, or one-time passwords (OTPs) for system access. 
  • Less than 30% of remote workers receive secure access policies, such as VPN encryption or device authentication
  • 30% of organizations implement physical security controls (ID badges, restricted zones), leaving the majority exposed to insider threats

Many employees remain untrained and unprepared for cyber threats, increasing the likelihood of breaches:

  • Fewer than 38% of employees have received cybersecurity awareness training. 
  • Only 19% of employees have ever reported a security incident through official channels. 
  • 28%

take proactive measures against phishing or social engineering, such as verifying identities before sharing information. 

A Path Forward: Integration, Automation & Security Overhauls 

With reference to Zoho’s maturity model, to advance from Level 2 (Standardization) to Level 3 (Structured Operations), companies need to adopt integrated digital suites, automate workflows, and enforce stronger security measures. The study estimates: 

  • Advancing from Level 2 to Level 3 takes 3–5 years and costs $250–500 per employee annually
  • Reaching Level 4 (Optimized Digital Operations) requires 10+ years and $500–1000 per employee annually

The full results of the “Trends in Digital Workplace Transformation” study are available for download here.

Survey Methodology 

The questionnaire was designed to evaluate key performance indicators (productivity, collaboration, security preparedness) and workplace indicators (tools, processes, employee experience, and change). It aimed to assess the alignment of workplace tools and processes with organizational goals and employee expectations. 4,900 employees globally, including 300 Canadians, were surveyed to assess their businesses’ digital workplace transformation (DX) maturity. 

DH2i, Microsoft, and SUSE to Present Two Sessions on Secure, Resilient AI and Data Platforms at SUSECON 2025

Posted in Commentary with tags on March 6, 2025 by itnerd

DH2i has announced its participation in SUSECON 2025, taking place March 10-14 in Orlando, Florida. DH2i, alongside technology leaders from Microsoft and SUSE, will present two sessions focused on building secure, resilient data platforms. The first, an in-person breakout session at the conference, will showcase how to optimize SQL Server 2025 and SUSE Rancher to create a unified, scalable data platform across containers, physical, and virtual machines (VMs) with DH2i’s DxEnterprise. The second, a pre-recorded session made available at the conclusion of the conference, will provide a step-by-step guide to deploying highly available AI applications using SUSE AI & BCI, Microsoft SQL Server, and DH2i DxEnterprise.

In-Person Breakout Session:

  • Date/Time: Thursday, March 13th, 11:00 am – 11:50 am ET
  • Presenters:
  • OJ Ngo, CTO and Co-Founder, DH2i
  • Abduallah Mamun, Senior Product Manager | Azure Data, Microsoft
  • Terry L. Smith Director, Global Alliances Solutions, Suse
  • Session Title: “Harnessing SQL Server 2025 and SUSE Rancher for a Unified Data Platform Across Containers, Physical, and Virtual Machines with DH2i’s DxOperator”
  • Abstract: Build a data environment that is cross-platform, spanning across virtual machines, physical machines, and containers in different environments. In this session, we will deploy SQL Server containers across Azure Kubernetes Service and other Kubernetes platforms using the DH2i Operator, managing the entire deployment with SUSE’s Rancher. With the release of SQL Server 2025, we will also showcase the vector search capability, enabling semantic search natively for your databases. If you are a database developer, engineer, or administrator looking to modernize your data estate, this session is for you. We will highlight new developer features in SQL Server 2025, making it easier to work with JSON, Parquet, and traditional relational data within the same environment. Additionally, we will cover how SUSE Rancher can be used to manage and administer Kubernetes clusters, ensuring efficient and streamlined operations in an all-Kubernetes environment. Join us to discover best practices, tips, and tools for optimizing your SQL Server container deployments in a hybrid cloud landscape.

Pre-Recorded Session (Viewable after SUSECON):

  • Presenters:
  • OJ Ngo, CTO and Co-Founder, DH2i
  • Amit Khandelwal, Principal Product Manager | Data Platform – SQL Server, Microsoft
  • Terry L. Smith Director, Global Alliances Solutions, Suse
  • Session Title: “How to Build a Secure and Resilient Production Environment for Your AI Applications”
  • Abstract: In today’s AI-driven world, swift and seamless transitions from development to enterprise deployment are essential, along with reliable high availability (HA) for databases supporting AI apps. In this demo-packed session, Ngo, Khandelwal, and Smith will guide IT teams step-by-step in building a comprehensive solution architecture for deploying enterprise AI at scale. They will use SUSE AI & Base Container Image (BCI) for a secure, feature-rich foundation, Microsoft SQL Server as a flexible and secure database backbone, and DH2i DxEnterprise for infrastructure-agnostic HA/DR. Attendees will leave with an actionable framework for building highly available, production AI apps on the SUSE platform using Microsoft SQL Server and DH2i, and an understanding of the benefits of SUSE tools like Rancher, NeuVector, and StackState.

SUSECON, taking place from March 10-14 in Orlando, promises to be a must-attend event for IT professionals, developers, and business leaders eager to explore the latest advancements in open-source solutions. With a focus on innovation, collaboration, and the future of enterprise technology, the conference will feature a dynamic lineup of keynote speakers, hands-on workshops, and engaging breakout sessions. Attendees will gain insights into topics such as cloud-native transformation, edge computing, and containerization while networking with industry leaders and peers. To learn more, please visit: https://www.suse.com/susecon/.

Microsoft Warns That Silk Typhoon Are Targeting Common IT Solutions To Pwn You

Posted in Commentary with tags on March 5, 2025 by itnerd

Researchers at Microsoft are warning that Chinese espionage group Silk Typhoon is now targeting common IT solutions like remote management tools and cloud applications to gain initial access. While they haven’t been observed directly targeting Microsoft cloud services, they do exploit unpatched applications that allow them to elevate their access in targeted organizations and conduct further malicious activities.

Microsoft has posted a report on this which you can read here:

https://www.microsoft.com/en-us/security/blog/2025/03/05/silk-typhoon-targeting-it-supply-chain/

Jim Routh, Chief Trust Officer at cybersecurity company Saviynt, commented:

“The identification of this threat actor, Silk Typhoon, and its tactics helps us understand the implications for enterprise protection. The key takeaway for an enterprise is to shrink the attack surface over time by moving to passwordless authentication where it is feasible. The second step is to limit the storage of credentials to specific data stores that have additive controls in place (PAM, continuous validation). The third is to seek network/endpoint capabilities that identify patterns to detect token usage and exploitation.” 

This is yet another example of a threat actor shifting tactics to achieve their goals. That means that those who defend organizations from threat actors have to shift their tactics to stop threat actors like these from succeeding.

UPDATE: Ensar Seker, Chief Security Officer at SOCRadar, commented: 

“Microsoft’s latest disclosure about Silk Typhoon signals a significant shift in cyber threat tactics. Instead of relying on direct exploits, they’re now targeting common IT solutions like remote management tools and cloud applications. This move aligns with a broader trend where adversaries exploit trusted third-party applications and supply chains to gain access to organizations.”

“This method allows them to infiltrate multiple targets simultaneously by exploiting stolen API keys, credentials, and vulnerabilities in commonly used applications.”

“While Microsoft states that Silk Typhoon hasn’t directly targeted its cloud services, the group is leveraging unpatched applications to escalate privileges and move laterally within networks. This highlights the ongoing challenge of securing cloud environments, where stolen credentials can grant adversaries persistent access.”

“It is very clear that the attack scope extends beyond IT service providers, affecting healthcare, legal, higher education, government, defense, and energy sectors. This suggests espionage and intelligence gathering remain the primary objectives, rather than immediate financial gain.”

“Third party as an attack vector is reminiscent of high-profile supply chain breaches like SolarWinds and MOVEit. Threat actors recognize that exploiting a single vendor can open doors to a wide range of targets, making IT supply chains one of the biggest cybersecurity weak points.”

“Actually, we shared our analysis with our customers just after the Snowflake case by stating ‘threat actors will continue targeting third-party SaaS, IaaS, and PaaS providers, abusing API integrations and identity federation mechanisms to move undetected across cloud environments. We are expecting more attacks to platforms like Snowflake in the near future just because they can exploit many companies instead of just one.'”

“This development is yet another wake-up call that nation-state cyber operations are becoming more refined, leveraging trusted IT solutions to remain stealthy and persistent. Organizations must move beyond traditional perimeter defenses and adopt a proactive security posture to counter this evolving threat landscape.”

YouTube phishing scheme targets creators with CEO deepfake videos

Posted in Commentary with tags , on March 5, 2025 by itnerd

Hi there — Hackers have been sending fake emails that include deepfake videos of YouTube’s CEO to announce fake changes to YouTube’s monetization – only to hack into creators’ accounts.

YouTube and its employees will never attempt to contact you or share information through a private video. If a video is shared privately with you claiming to be from YouTube, the video is a phishing scam. Do not click these links as the videos will likely lead to phishing sites that can install malware or steal your credentials. Never click on links in these videos and you can report the video by following these steps.

Anna Collard, SVP Content Strategy & Evangelist at KnowBe4, commented: 

“This latest phishing scam targeting YouTube creators is a reminder that social engineering tactics don’t need to be new—just more convincing. The use of deepfake videos of YouTube’s CEO isn’t groundbreaking; scammers have long exploited our trust in authority figures to manipulate emotions like curiosity or greed. What has changed is the ease and accessibility of AI, which makes these scams appear more polished and credible.”

“According to Egress (2024), 82% of phishing kits now include deepfake capabilities, democratizing this technology for any cybercriminal with the right motivation. This means low-effort scams can now look far more legitimate, making vigilance more important than ever.”

“The key defense remains the same: digital mindfulness and a zero-trust mindset. Pause before reacting impulsively, particularly if it triggers an emotion or existing bias, verify independently, and never assume legitimacy just because something looks real. AI may enhance deception, but our best defense is still critical thinking and security vigilance.”

This is an example of how threat actors are evolving their schemes using techniques like deepfake videos to lure the unsuspecting into falling for a scam. Which means that the best defense is to ensure that people are trained to spot these schemes so that they aren’t effective.

Hammerspace Brings Hyperscale AI Storage Solutions to China in Partnership with Yition.ai

Posted in Commentary with tags on March 5, 2025 by itnerd

Hammerspace, the company orchestrating The Next Data Cycle, today announced a strategic partnership in China with Yition.ai, a leader in making hyperscale AI infrastructure accessible and efficient.

This collaboration combines Hammerspace’s proven high-performance Global Data Platform for object and file storage with Yition.ai’s mission to revolutionize AI storage economics and accessibility, offering new storage and data orchestration strategies for the massive unstructured data generated from AI usage by cloud providers, high-performance computing and hyperscalers.

The partnership combines Yition.ai’s cost-effective and scalable AI storage solutions through deep integration of hardware and software optimizations, with Hammerspace’s data platform which provides the high-performance data path to power large-scale compute clusters efficiently, the data orchestration to unify data sources, and standards-based approach to use the compute, storage, and networking infrastructure of the customer’s choice. As recent developments with large language models (LLMs) turn the page on the economics of AI and portend ever-greater AI models, this approach expands access to the distributed data sets needed to fuel AI while reducing infrastructure capital expenditure and providing high-performance storage that meets the demanding needs of modern AI workloads.
 

Together, Yition.ai and Hammerspace address the growing challenge of managing massive multimodal datasets across distributed environments.  Current LLMs utilize only about 3% of the data generated by humans, but organizations increasingly work with video, audio, and other rich media formats that comprise 97% of today’s internet traffic.


Traditional storage approaches struggle to keep pace with this explosion of unstructured data and the performance needed to use large compute clusters efficiently, especially as AI models proliferate. Yition.ai is strategically positioned to meet this challenge by scaling AI storage to support the massive volume and the diversified nature of data essential for next-generation applications. At the same time, Hammerspace’s solution, recently validated through Meta’s LLM deployment managing 24k GPU clusters, provides the foundation for next-generation AI infrastructure.

The partnership delivers several key innovations:

  • Cost-effective scaling through hardware-software optimization, object storage and hyperscale NAS architectures
  • Automated data orchestration for multimodal AI workloads
  • Advanced data automation for cleaning, organization, and synthesis
  • Seamless support for vertical industry applications including autonomous driving and robotics
  • Efficient resource utilization that significantly reduces capital expenditure

Customers working with Hammerspace and Yition.ai will benefit from proven architectures that scale from departmental AI projects to massive production deployments while maintaining optimal cost efficiency.

The partnership in China comes as Hammerspace Asia continues to grow its commitment to the market. The company currently has more than 20 employees in the region and plans to continue growing.

For more information about Hammerspace’s AI infrastructure solutions, visit www.hammerspace.com.


Learn more:

  • Hammerspace Global Data Platform: Data Sheet
  • Hammerspace Global Data Platform: Blog

95% of Canadian software development teams will use AI agents within two years says Salesforce

Posted in Commentary with tags on March 5, 2025 by itnerd

According to Salesforce’s new State of IT research79% of Canadian software development leaders believe AI agents will become as essential to app development as traditional development tools.

With Canada’s productivity problem continuing to stall, agentic AI such as Salesforce’s digital Labor platform Agentforce can be the path forward for software developers to be more efficient so they can focus less on simple, tedious tasks like writing code and debugging, and more on strategic, high-impact projects.

AI agents are poised to be the backbone of future development processes, allowing developers to focus more on strategic innovation.

The survey identified key challenges that are holding software developers back from building and deploying AI agents:

  • 76% of Canadian software development leaders say their infrastructure needs updates and 51% say their testing processes aren’t fully prepared to build and deploy AI agents.
  • 75% of Canadian software development leaders believe AI knowledge will soon be a baseline skill for their team, but only 62% say they’ve introduced employee training on AI.

You can read the research here.

Methodology

  • This data is based on a Salesforce global survey of 2,000 software development leaders worldwide, which included 200 IT leaders in Canada. Canadian data one-pager: here.