• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • IBM To Add Generative AI To QRadar

    November 13, 2023 Alex Woodie

    If you feel that cyber crooks are getting the upper hand, you’re not alone. Studies show cybercrime volume booming while security professionals struggle to connect the dots and keep up. One possible route forward was presented last week by IBM, which announced that it will add generative AI capabilities to its QRadar SIEM tool.

    Security information and event management (SIEM) tools are the sharp end of the stick for security-loving organizations, as they are where the hard work of assembling security data from all of the various components in the modern IT stack (including IBM i) and then trying to …

    Read more
  • Why You Should Be Concerned About the MGM ‘Vishing’ Attack

    September 27, 2023 Alex Woodie

    Las Vegas casino giant MGM Resorts International has lost millions of dollars this month and suffered damage to its brand as a result of a high-profile ransomware attack that is still ongoing across several of its properties. The hackers that infiltrated MGM’s computer systems are said to have used a low-tech social engineering technique dubbed “vishing” that just about any company is susceptible to, including IBM i shops.

    The systems that hackers shut down on September 11 may or may not be IBM i servers or connected to them. MGM has been an IBM i user in the past, just …

    Read more
  • Capture Point Restore: The Perfect Companion For High Availability

    December 12, 2022 Ash Giddings

    Businesses are constantly challenged by cyberattacks, coupled by their ever-increasing diverse nature. Ransomware and malicious data deletion or corruption can originate from both inside or outside of the business and staying out of the headlines by preventing attacks or at worst limiting the impact is high on the agenda for many.

    There’s seemingly never a day goes by without a prominent attack being reported, damaging both the tangible capabilities to conduct business at the time, combined with intangible ongoing damage to business reputation that these destructive incidents invariably bring.

    Many businesses have wisely invested in high availability for their IBM …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • To Comfort The Afflicted And Afflict The Comfortable
  • How FalconStor Is Reinventing Itself, And Why IBM Noticed
  • Guru: When Procedure Driven RPG Really Works
  • Vendors Fill In The Gaps With IBM’s New MFA Solution
  • IBM i PTF Guide, Volume 27, Number 27
  • With Power11, Power Systems “Go To Eleven”
  • With Subscription Price, IBM i P20 And P30 Tiers Get Bigger Bundles
  • Izzi Buys CNX, Eyes Valence Port To System Z
  • IBM i Shops “Attacking” Security Concerns, Study Shows
  • IBM i PTF Guide, Volume 27, Number 26

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle