Cyberwarfare in the Digital Age: Ukraine vs. Russia


Summary Bullets:

Amy Larsen DeCarlo – Principal Analyst, Security and Data Center Services

• In the months leading up to Russia’s invasion of Ukraine, the country was laying the groundwork for cyberwar.

• But Ukraine is fighting back with the support of its own underground hacking community and hackers from beyond its borders playing a part in interfering with Russian operations and trying to stall the invading country’s momentum.

Cyberattacks have been used by hacktivists in the past to wage political and ethical battles for years. But in the days following Russia’s invasion of Ukraine is taking cyberwarfare to a new level. Months before to Russia’s February 24th military invasion of Ukraine, Russia took to cyberspace to infiltrate and in some cases destabilize networks within its neighbor. Reports of distributed denial of service (DDoS) attacks allegedly initiated by Russia surfaced the week before the invasion, flooding the networks of Ukraine’s defense ministry and two banks. The attacks against the banks were launched in two waves, with the first interrupting service. The second stage involved text messages to clients telling them the bank was no longer functioning.

And there are indicators that Russia had breached Ukraine’s months before and was lying in wait to attack, installing data wiper malware on hundreds of computers In Ukraine. The wiper malware can delete all files from a computer, essentially making the computer unusable.

Continue reading “Cyberwarfare in the Digital Age: Ukraine vs. Russia”

Should Enterprises Voyage into the Metaverse?

Summary Bullets:

Gary Barton – Analyst, Business Network and IT Services

• Enterprises should beware the hype – the metaverse is not a decision that needs to be made this year, if ever

• However, elements of the metaverse are with us now and can offer genuine benefits – e.g., for training or collaboration

The ‘metaverse’ is manna from heaven for tech journalists (and, indeed, analysts!) as it is poorly defined, can be applied to both current technology and fantastical future ideas, and is a concept much loved by technology giants such as Microsoft and Facebook/Meta Platforms Inc. This sort of scenario is true of many new technologies, but the metaverse is a more ethereal and intangible concept than most – to the extent that even its name is meta.

Continue reading “Should Enterprises Voyage into the Metaverse?”

The Myths of the Metaverse  

S. Schuchart

Summary Bullets:

  • The metaverse should be divided into the consumer metaverse (CMV) and enterprise metaverse (EMV) segments for discussion.
  • Metaverse proponents must get past over-enthusiastic, get-rich-quick thinking and provide real value, particularly in the EMV segment.

The inaugural report on the metaverse from the enterprise technology group at GlobalData is now available to subscribers.  Discussion centers on not only the origins of the term ‘metaverse,’ but also hype, pitfalls, value, and the need to divide the market, at least at a high level.  GlobalData subscribers can read it here.

The metaverse can be logically divided into two macro parts: the CMV and the EMV.  At the time of this writing, momentum is coming from the CMV, where companies like Meta Platforms (Facebook) are driving interest, money, and attention.  The vast majority of the hardware is also coming from the CMV, at least for now.  This is one of those rare occasions when the technology flows up into the enterprise from the consumer space. Continue reading “The Myths of the Metaverse  “

As Cloud Giants Prep DevOps Solutions, Disruptors Offer Alternatives

C. Dunlap

Summary Bullets:

  • New DevOps tools help fill out CICD pipelines, which improve efficiency and reduce costs.
  • StormForge added ML models to its observability and resource management portfolio this week.

A new breed of DevOps platform providers are receiving newfound attention among IT operations teams for their ability to improve efficiency and reduce costs associated with deploying modern application architectures into production throughout multi-cloud environments, all while ensuring continuous delivery capabilities. Continue reading “As Cloud Giants Prep DevOps Solutions, Disruptors Offer Alternatives”

UK Data WAN Market Continues to Evolve

• The combination of Virgin Media and O2 is potentially a significant counterweight to BT and Vodafone, but plenty of competition from challengers like Exponential-e and Neos Networks

R. Pritchard

• Roll-out of local/last-mile fiber networks extending and expanding bandwidth and choice, ensuring ongoing competition and innovation – both through direct and third-party channels

UK enterprises, organizations, and the public sector increasingly rely on data connectivity to deliver to their customers, to communicate, and share information internally and with partners. While the scope and manner of such communications has changed (e.g., greater use of public Internet and the growing importance of cloud/SaaS connectivity) during the COVID-19 pandemic, the fundamentals of market growth remain: everyone is using more data everyday for an expanding range of activities, applications, and communications.

Continue reading “UK Data WAN Market Continues to Evolve”

IBM Sells Watson Health: Running Before Walking?

Summary Bullets:

Principal Analyst, Advanced Analytics

• IBM leveraged Deep Blue, a supercomputer, to victory over chess champion Gary Kasparov and Watson’s subsequent victory over Jeopardy champion Ken Jennings to highlight the promise of AI.

• IBM hoped to expand Watson beyond game playing to solving problems that had proven intractable to business managers. Seeking a challenge, IBM adapted Watson to diagnose and treat cancer.

IBM’s experience developing the platform for Jeopardy gave the company hope that it could broaden Watson’s capabilities. Key to the success of Watson’s victory at Jeopardy was the development of DeepQA, a specialized software architecture that, according to IBM, “generates a wide range of possibilities and for each [query] develops a level of confidence by gathering, analyzing, and assessing evidence.”

Continue reading “IBM Sells Watson Health: Running Before Walking?”

EU Plan to Boost Share of Global Chip Production Must Address Key Challenges

C. Drake

Summary Bullets:

  • The EU Chips Act is intended to help Europe compete in the global market for semiconductors, while ensuring that EU industries are protected against future supply shortages.
  • The EU’s strategy faces several hurdles, including the funding gap that exists between the EU’s support package and much larger investment packages in the US, South Korea, and China.

The EU Chips Act, announced by the European Commission on February 8, is intended to have far-reaching consequences for Europe’s ability to compete in the global market for semiconductors and for ensuring that EU industries – including automotive and medical device manufacturing – are better positioned to deal with future semiconductor supply shortages. Continue reading “EU Plan to Boost Share of Global Chip Production Must Address Key Challenges”

Google Addresses Microsoft and Shadow IT with Workspace Essentials Starter Edition

Summary Bullets:

G. Willsky

• Essentials Starter parallels Microsoft Teams Essentials launched last December.

• Essentials Starter is consistent with the shadow IT movement that has recently gained great momentum.

Google has announced a free version of Google Workspace for business users named Google Workspace Essentials Starter Edition. In addition to being one of the most recent enhancements to Google Workspace, the offer is noteworthy for how it is positioned in the market.

Continue reading “Google Addresses Microsoft and Shadow IT with Workspace Essentials Starter Edition”

For the UK Government to Be Successful with Its New Cybersecurity Initiative, the Public Sector Needs to Change

R. Muru

Summary Bullets:

  • The UK government’s strategic announcement on its public services cybersecurity strategy is a positive, as there is a real need to address cyber threats in the public sector.
  • For the new cybersecurity strategy to succeed, key departments responsible for implementing the strategy within authorities and the public sector require operational transformation and greater agility.

Threat Level Across UK Public Sector

The UK Cabinet Office and Chancellor of the Duchy of Lancaster Steve Barclay announced on January 25 that the government will launch what it calls the “first ever government cybersecurity strategy” to counter increased cyberattacks on IT systems and associated services within public services.  The government’s strategic initiative aims to address the sheer volume of cyberattacks on the UK public sector.  Figures taken from the National Cyber Security Centre between September 2020 and August 2021 suggest that approximately 40% of cyberattacks were aimed at the public sector.  Some of the authorities believed to have been compromised include the Redcar & Cleveland, Wealden District, Gloucester City, and Hackney Councils.  Additionally, it’s believed that councils across the UK reported more than 700 data breaches in 2020 to the Information Commissioner’s Office (ICO).  This, in the context of future increased digitization of public services encompassing technologies like Internet of Things and smart cities, could be a future catalyst in the exponential increase of cyberattacks in the public sector at a local and regional level. Continue reading “For the UK Government to Be Successful with Its New Cybersecurity Initiative, the Public Sector Needs to Change”