Taking Major Business Momentum in 2025, Datadobi Reimagines How Enterprises Can Transform Unstructured Data into a Valuable Asset

Posted in Commentary with tags on February 11, 2025 by itnerd

Datadobi, a global leader in unstructured data management, has today set out its vision to capture its place in the Unstructured Data Management market, propelled by 12 months of outstanding performance, technology innovation, and industry recognition. As organizations look to release the value of unstructured data across their hybrid cloud environments, Datadobi is ideally positioned to address their needs and transform it into a valuable asset that drives innovation and success.

As Gartner® quoted in its Modernizing File Storage Data Services with Hybrid Cloud report* at the end of 2024, “ New hybrid cloud storage capabilities are now considered ‘must have’ to address the growing challenges of exponential data growth, digitalization and globalization of data, generative AI, resilience, cloud integration and migration.”                                                                  

To deliver on these growing challenges, technology leaders worldwide are focusing on their storage infrastructure to prepare for generative AI and other strategic IT priorities. This includes investment in effective hybrid-cloud strategies, which is now a key requirement for addressing ubiquitous data growth. With limited mature HCDS solutions on the market, Datadobi has built customer trust in the value of effective data management, building a software platform that reimagines how organizations can navigate data complexities, optimize business intelligence, and find a competitive edge.

Datadobi’s leadership position in the Unstructured Data Management market has been established following a range of significant business achievements over the last 12 months, which include:

StorageMAP 7.0 – a game-changer for the Unstructured Data Management market

StorageMAP 7.0 is a game-changer for the Unstructured Data Management market, with previously unheard-of features and functionality to provide the deepest insights possible into heterogeneous unstructured data environments. The solution enables customers to make the most intelligent data-driven decisions that drive innovation and competitive advantage with StorageMAP 7.0 while also managing their unstructured data’s inherent risk and escalating costs as never before.

Award-winning achievements and analyst recognition

A series of industry award wins underlined Datadobi’s exceptional performance in 2024. These included the Cloud Computing Magazine Excellence and ChannelVision Visionary Spotlight awards. The company also made CRN’s Big Data 100 and Storage 100 lists. In addition, Denise Natali, Datadobi’s Vice President of Americas Sales, was included on CRN’s “100 People You Don’t Know But Should” list.

The company was also featured in several key industry analyst reports, including Gartner’s “Modernize File Storage Data Services With Hybrid Cloud.” Additionally, Omdia recognized Datadobi’s StorageMAP platform for offering “comprehensive unstructured data management” capabilities and noted, that “Datadobi’s ability to handle unstructured data (documents, emails, social media posts, images, videos, audio files, sensor data, etc.) puts it above most other solutions.”

A growing international team

In 2024, Datadobi also strategically expanded its team, adding key sales leadership personnel, including Denise Natali as Vice President of Americas Sales, Michelle Butler as California Sales Executive, and other new personnel across the USA and EMEA. These strategic hires across multiple regions are central to the company’s commitment to growth and have significantly enhanced its capabilities in key target markets.

Lee Enterprises Has Apparently Been Pwned

Posted in Commentary with tags on February 10, 2025 by itnerd

It is being reported that newspapers across the country owned by the news media company Lee Enterprises, parent company of more than 70 daily newspapers and nearly 350 weekly and specialty publications in 25 states, were impacted by a cyberattack which made them unable to print newspapers and created problems with their websites.

Erich Kron, security awareness advocate at KnowBe4, commented:

“Although it isn’t officially announced, the symptoms of this attack have all of the signs of a significant ransomware event. Ransomware groups love to target organizations that are time sensitive, and media outlets absolutely fit that description, especially ones that produce a physical product.

Unfortunately, during these attacks cybercriminals very often steal any data they can find that may be useful to sell, or to use as leverage when paying a ransom. This is often going to include employee or customer information, and in the case of media outlets could include sensitive information such as confidential informants and other people who may want to remain anonymous.

Ransomware attacks are often very costly and don’t end with simply paying the ransom. The cybercriminals will often leave back doors in the network that need to be found and removed to ensure the attackers don’t simply reinfect the network, demanding yet another ransom payment. Hiring cybersecurity experts to find and remove back doors can be extremely costly, plus there is the cost of sales and advertising that would be halted while the systems are still down.

Because ransomware is most often spread by targeting employees with social engineering attacks, such as phishing, smishing, or even vishing, it’s critical that organizations not only have technical controls in place, but also have a robust human risk management program as well.”

I was hoping that things would be better in 2025, but given the number of attacks that I am reporting on, it honestly feels worse than 2024. Which means that this is going to be a very long year.

A Massive Brute Force Attack Is Underway

Posted in Commentary with tags on February 10, 2025 by itnerd

A large-scale brute force password attack using almost 2.8 million IP addresses is underway, attempting to guess the credentials for a wide range of networking devices, including those from Palo Alto Networks, Ivanti, and SonicWall.

I have commentary on this from a variety of experts. Starting with Erich Kron, Security Awareness Advocate at KnowBe4

“VPNs are a great target for bad actors because in a corporate world, they can lead to direct access to the network behind the protection of firewalls and other edge security devices. If these bad actors are able to guess or brute force the VPN password, cybercriminals could attempt anything from data theft to ransomware, or more. In many cases, cybercriminals could simply sell this network access to other bad actors as well, pocketing the cash and letting the buyer do whatever nefarious deeds they would like.”

“These types of attacks trying to break into networks though VPNs are often driven by processes such as ‘password spraying,’ which is using a predefined list of simple or common passwords, and a list of known email addresses or usernames, or through ‘credential stuffing,’ which is using a list of usernames and passwords stolen in other data breaches or by tricking employees to give up credentials through fake login portals. The use of MFA, or some other sort of secondary authentication technology, can help stop the ability of bad actors to log in, however, it is not foolproof.”

“By using so many IP addresses that are scattered throughout the globe to carry out these attacks, the cybercriminals can make it extremely difficult for defenders to stop the brute force attacks attempting to pierce the protections put in place by targeted organizations. These source IP addresses are often from individual computers infected with malware, IoT devices that have been compromised, or out of date consumer routers or internet facing devices that attackers have already taken over.”

“These sorts of attacks stress the importance of educating employees about good password hygiene, including not reusing passwords that may have been stolen in other breaches, and the need for a second factor of authentication for any important accounts, especially those that can access the organization from the internet.”

Next up is Chris Hauk, Consumer Privacy Champion at Pixel Privacy:

“Brute force password attacks have long been and will continue to be, a popular method of attacking systems, websites, VPN appliances, and other password-protected devices. While there are more sophisticated ways to perform attacks, hackers depend on the fact that their targets haven’t been kept updated to the latest software, firmware, or operating system versions, or that the device’s logins aren’t protected with two-factor or multi-factor authentication methods.”

Finally we have Brian Higgins, Security Specialist at Comparitech:

“This uptick in high-volume activity is symptomatic of the monetary allure that access dangles in front of cyber-criminal enterprises. Although such a massive brute-force endeavor smacks a little of the old ‘spray and pray’ methodology, the sheer volume and potential value of online targets these days makes the whole thing worthwhile. If anyone still hasn’t switched to Two or Multi Factor authentication or is adamantly clicking ‘ask me later’ when they see an update prompt, then this should be their final warning. There is research that says we will hit 75 billion connected devices in 2025 so Bot-Nets will only get bigger and from a criminal’s point of view, there’s no point letting them sit idle.”

Solutions such as MFA/2FA as well as totally passwordless solutions are no longer optional based on an attack like this one. Because when attacks like this one succeed, they have grave consequences for the organization at the receiving end.

UPDATE: Darren James, Senior Product Manager at Specops Software, commented:

“Brute Force attacks aren’t usually very sophisticated, but this example does certainly seem to demonstrate a well-planned and determined attack against its potential victims using such a large number of compromised devices based all over the globe.

The benefit of a brute force attack of this nature is that it’s in no hurry to crack the security of a specific individual, but instead targets hundreds, thousands maybe even millions of individual user accounts, trying to connect using a list of already known breached passwords, once it finds a match it might then proceed to deliver a payload or it may just keep that user/password pair to one side to be used later or sold on to the highest bidder.

This process usually takes a lot of time, but by simultaneously using 2.8 million devices they can certainly speed up this type of attack and the amount of positive “hits” they get.

From our own recent research we found that “admin” was still one of the most common base terms used in breach passwords, so it’s vitally important to make sure that the admin interfaces of these VPN and Firewall servers and devices that are being targeted are not using easily guessable passwords or default passwords set by their manufacturers.

Even if those passwords have been changed, organizations should also continuously scan to make certain that the passwords that have been set haven’t themselves become breached.

Implement MFA on these devices. This can be done using RADIUS authentication if there’s no secure built-in 2FA option, and finally consider whether you need to expose the admin interface externally, usually this is not a good idea, but could have been left over from a support session.”

This is also being reported by Bleeping Computer and has been tracked by The Shadowserver Foundation

UPDATE #2: Lawrence Pingree, VP, Dispersive adds this:

This problem is solved by separating the control plane and data plane for VPNs and transport infrastructure, as we do. A recent analysis of 2024 breaches found that over 56% of enterprises experienced an attack related to their VPNs (report link: https://blog.dispersive.io/vpns-under-siege-2024-cyber-attacks-data-breach-in-review ). I do not think most Zero Trust providers are immune to this same style of attack.

TikTok Ban: Cross-Platform Trends in Reach and Engagement 

Posted in Commentary with tags on February 10, 2025 by itnerd

Research done by the team at SafetyDetectives has been posted that  measured how the news of the TikTok ban in the US affected major accounts and analyze how different strategies led to growth or decline across platforms.Despite it being a short ban, they found that the news produced surprising effects. Some of their key findings were:

  • Of the 30 accounts included in their research, half gained followers after January 19, while the rest experienced neither loss nor gain. Of the other 14 accounts that gained followers after the temporary suspension, half are news outlets while high-profile celebrities and brands showed little to no gain.
  • Surprisingly, more accounts suffered engagement losses on Instagram than on TikTok. Accounts lost a combined total of 8.1 million in average likes (versus TikTok’s 7.7 million) and 104,000 in average comments (versus TikTok’s 159,000).
  • Only 8 of the accounts included in their study experienced growth on Facebook during this period, and Amazon was the only one to lose followers, while the rest maintained stability.
  • As on TikTok, none of the accounts included in their study lost followers on YouTube. Not surprisingly, the top 5 accounts include a professional YouTuber, a streamer, and 3 musicians.

The temporary suspension of TikTok highlighted how different platforms, while typically offering the same basic capabilities, won’t necessarily cater to the same categories of content. For creators, brands, and social media managers, this reinforces the importance of understanding your target audience and meeting them where they are.

You can access their report here: https://www.safetydetectives.com/blog/tik-tok-ban-research/

Patch or Perish: Why Vulnerability Management Can’t Wait According To ESET

Posted in Commentary with tags on February 10, 2025 by itnerd

ESET has put up a blog post titled, “Patch or perish: How organizations can master vulnerability management” that I think those who are responsible for patching all the things should read.

Cybercriminals are moving faster than ever, with vulnerability exploitation now a leading cause of ransomware attacks and data breaches. A recent report found that observed cases of vulnerability exploitation tripled in 2023 alone. Yet, with record-high CVEs and shrinking patching windows, many organizations are struggling to keep up. 

ESET’s latest blog post insights dive into: 

  • Why organizations are overwhelmed by a relentless surge in software vulnerabilities 
  • The rise of zero-day exploits and perimeter-based attacks 
  • How AI-driven threat actors are making patching even more urgent 
  • Actionable steps to automate and prioritize vulnerability management 

You can read the blog post here.

Bell Sponsors The Commemoration Of The 25th Anniversary of Vince Carter’s Iconic Dunk

Posted in Commentary with tags on February 10, 2025 by itnerd

Bell has announced that it is sponsoring the Toronto Raptors’ commemoration of the 25th anniversary of Vince Carter’s legendary between-the-legs dunk from the 2000 NBA Slam Dunk Contest. 

This momentous occasion will be commemorated during a special “GOAT Night” game at Scotiabank Arena this Wednesday, February 12th, featuring the Raptors versus the Cleveland Cavaliers. Bell is presenting this “Dunkaversary,” a tribute to Carter’s enduring legacy and his impact on Toronto basketball.

As part of the sponsorship, Bell has developed an innovative augmented reality (AR) experience, Bell SkySlam. Fans across Canada can use the Raptors App or BellSkySlam.ca to virtually place Carter’s iconic dunk onto any city skyline, experiencing this historic moment in stunning 3D.

You can read the press release here for more details. 

Other World Computing (OWC) and ARCHIWARE Partner Up

Posted in Commentary with tags on February 10, 2025 by itnerd

Other World Computing and ARCHIWARE, a leading provider of data management software, today announced a strategic partnership to deliver seamless shared storage, cloning, backup, and archiving for collaborative workflows. Under the terms of the partnership agreement, the ARCHIWARE P5 platform will now be natively integrated with the OWC’s Jellyfish Shared Storage for Video Production to enhance collaboration capabilities, ensure data protection, and future-proof asset management.

With the new Jellyfish Manager 3.0, using ARCHIWARE P5 with Jellyfish storage products to protect production data is now easier than ever. Users can install, activate, and launch ARCHIWARE P5 directly within the Jellyfish Manager interface with just a few clicks – no additional P5 server is required. Running natively on all Jellyfish NAS solutions, P5 can be enabled simply by toggling a switch in the Jellyfish Manager. Once activated, users can seamlessly access and manage ARCHIWARE P5 without ever leaving the Jellyfish Manager UI, ensuring a streamlined and efficient workflow.

The Perfect Fit to Keep Your Media Safe and On Hand in A Collaborative Workflow

  • P5 Synchronize clones data from Jellyfish to secondary online storage and creates an identical file system for high availability. If needed, file access is instantaneous without restore.
  • P5 Backup creates security copies of files and projects on disk, LTO or Cloud storage so they can be restored in case of accidental deletion, file corruption, or technical failure. At least one of these periodic security copies can and should be kept offsite, so data is safe even in case of natural disaster.
  • P5 Archive comes in when long-term storage and preservation are required. Archived media and projects are comprised in the P5 Archive catalog, including previews for visual browsing. User-definable metadata fields and extensive search features make it incredibly easy to find relevant media and restore it quickly and easily with just one click.
  • The flexible Archive with the P5 Data Mover add-on to P5 Archive: everything archived can be migrated or replicated to a different storage anytime. This way, the Archive can adapt to changing policies, requirements or price points and stays flexible and future-proof. Like P5 Backup, P5 Archive is compatible with numerous cloud services such as Amazon S3, Glacier, Microsoft Azure, Backblaze, and Wasabi. If you prefer a local Archive, you may choose virtually any disk or LTO tape storage on the market.

Jellyfish High-Performance Shared Storage for Modern Post-Production

  • Purpose-built for creative professionals, by post-production professionals, Jellyfish delivers turn-key high-speed production storage optimized for film, television, corporate communication, live events, broadcasting, government, and education.
  • Scalable and versatile shared storage for any workflow – offering HDD, SSD, and all-flash configurations in both desktop and rack-mounted systems. From compact solutions for small teams to petabyte-scale Full Flash and Hybrid options for enterprise and mission-critical applications, Jellyfish adapts to evolving workflow needs.

Want to learn more? Please join this live webinar:

Webinar: Effortless Video Storage and Backup: Jellyfish Manager 3.0 and ARCHIWARE P5 Integration Made Simple

About: With OWC Jellyfish, you don’t need to be an IT expert in order to use shared storage for your video projects. With ARCHIWARE P5, professional backup, archive, and replication are also simplified. P5 and Jellyfish come together in the latest Jellyfish Manager 3.0 release, where P5 is integrated and enabled with a single click. In this webinar, OWC’s Luke Marchant and ARCHIWARE’s David Fox run through the joint solution, showing how to access P5 and explaining some simple archive and replication workflows. Register now for what promises to be a highly informative 40 minutes.

When

Wed, Feb 19, 2025, 2:00 PM – 2:40 PM Central European Time (CET)

Register here: https://register.gotowebinar.com/register/8008420929092270941

Wed, Feb 19, 2025, 1:00 PM – 1:40 PM Eastern Standard Time

Register here: https://register.gotowebinar.com/register/6959993711078798679

Samsung Galaxy S25 Series Is Now Available

Posted in Commentary with tags on February 8, 2025 by itnerd

The newly unveiled Samsung Galaxy S25 Series is officially available for purchase at Samsung.com/ca as of yesterday. 

The Galaxy S25 Series also pairs seamlessly with the new Galaxy Book5 Series. For example, through Storage Share you can directly access files from connected devices without having to download them individually, using your phone, tab and PC as one device. You can also multi-task across devices thanks to Multi Control, as well as Quick Share files quickly and easily between devices.

For more on the Galaxy Book5 Series, please see here.

PSA: If You Are Using DeepSeek, Dump It ASAP

Posted in Commentary with tags on February 7, 2025 by itnerd

Last week I brought you a story about DeepSeek having a database that for a brief period of time was publicly accessible. That was on top of the fact that DeepSeek was under attack, and two reports of successful jailbreaks popped up. Now there’s news that the iOS version of DeepSeek seriously fails at basic security:

A NowSecure mobile application security and privacy assessment has uncovered multiple security and privacy issues in the DeepSeek iOS mobile app that lead us to urge enterprises to prohibit/forbid its usage in their organizations.

And:

Key Risks Identified:

  1. Unencrypted Data Transmission: The app transmits sensitive data over the internet without encryption, making it vulnerable to interception and manipulation.
  2. Weak & Hardcoded Encryption Keys: Uses outdated Triple DES encryption, reuses initialization vectors, and hardcodes encryption keys, violating best security practices.
  3. Insecure Data Storage: Username, password, and encryption keys are stored insecurely, increasing the risk of credential theft.
  4. Extensive Data Collection & Fingerprinting: The app collects user and device data, which can be used for tracking and de-anonymization.
  5. Data Sent to China & Governed by PRC Laws: User data is transmitted to servers controlled by ByteDance, raising concerns over government access and compliance risks.

Implications for Enterprises & Government Agencies:

  • Exposure of sensitive data, including prompt data; intellectual property, strategic plans, and confidential communications.
  • Increased risk of surveillance through fingerprinting and data aggregation.
  • Regulatory & compliance risks, as data is stored and processed in China under its legal framework.

Recommended Actions:

NowSecure urges enterprises and agencies to:

Continuously monitor all mobile applications to detect emerging risks.

Immediately remove the DeepSeek iOS app from managed and BYOD environments.

Explore alternative AI platforms that prioritize mobile app security and data protection.

This is pretty bad. In fact it’s horrific. Thus I am going to say that if you have the DeepSeek app installed on any device, delete it ASAP. It’s clearly risky to have on your device based on what we see with the iOS version of their app. And to be clear, there are risks when using any AI as data that you may not want to be out in the public eye might be used for purposes like training the AI or it might be exposed to third parties like this example. But this example with DeepSeek is way worse. Hopefully DeepSeek gets investigated to see how far the rabbit hole DeepSeek’s security issues go.

Love, Money, and Disagreements: New Survey By Wise Reveals All

Posted in Commentary with tags on February 6, 2025 by itnerd

With Valentine’s Day just around the corner, Wise, the international money account, has conducted a revealing survey that sheds light on how couples navigate financial discussions and challenges. 

These findings offer a fascinating glimpse into the financial dynamics of modern relationships. 

Key Findings:

Canadians Are More Comfortable Discussing Finances Than Americans

  • A striking 75% of Canadian couples feel comfortable discussing finances with their partners, compared to only 32% of Americans.
  • Over half of Canadians (56%) engage in regular financial discussions, yet 81% of them experience disagreements during these conversations.
    • Cross-border couples are more prone to financial disagreements and often seek advice from close ones, consulting their mom (31%), dad (31%), friends (38%), and co-workers (27%) about financial matters 3-5 times or more per month.

Top Areas of Financial Disagreement Among Couples

  • Spending on non-essential items like streaming subscriptions and vacations (30%).
  • What’s considered a necessity to spend on each month (29%).
  • Savings in relation to income each month (25%).
  • Cultural differences make financial conversations uncomfortable for 24% of those in cross-border relationships.

Reasons for Discomfort in Financial Discussions

  • Fear of causing disagreements (28%).
  • Different ideas about spending and saving (26%).
  • Differences in perceived financial responsibility (25%).

Impact of Living Situations on Financial Discussions

  • One-third of couples not in long-distance relationships see cross-border distance as a potential barrier due to the cost of maintaining places in two countries (32%) and travel expenses (31%).
  • Cross-border couples face higher levels of uncertainty about their future (22% vs. 9% of those living in Canada) and are more unsure about which financial tools to use (22% vs. 9% of those living in Canada).
  • Managing different currencies and transferring money is a concern for 29% of cross-border couples, compared to just 5% of those living in Canada.

Striving for Financial Harmony

  • Canadian couples report higher satisfaction with shared financial responsibilities (75%), likely due to similar philosophies about money (66%).
  • This indicates a strong desire for financial transparency and mutual understanding within Canadian relationships.

Strategic Financial Discussions and Planning

  • Canadians are strategic in their financial discussions and planning with their partners.
  • Both Canadian and cross-border couples believe the right time to begin sharing expenses is when planning a future together (37%) or moving in together (34%).
  • Canadians prioritize important financial discussions within the first year of their relationship, focusing on existing debts (70%), sharing expenses (69%), budgeting strategies (66%), and major planned purchases like a house, car, or education (62%).