• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • IBM To Add Generative AI To QRadar

    November 13, 2023 Alex Woodie

    If you feel that cyber crooks are getting the upper hand, you’re not alone. Studies show cybercrime volume booming while security professionals struggle to connect the dots and keep up. One possible route forward was presented last week by IBM, which announced that it will add generative AI capabilities to its QRadar SIEM tool.

    Security information and event management (SIEM) tools are the sharp end of the stick for security-loving organizations, as they are where the hard work of assembling security data from all of the various components in the modern IT stack (including IBM i) and then trying to …

    Read more
  • Why You Should Be Concerned About the MGM ‘Vishing’ Attack

    September 27, 2023 Alex Woodie

    Las Vegas casino giant MGM Resorts International has lost millions of dollars this month and suffered damage to its brand as a result of a high-profile ransomware attack that is still ongoing across several of its properties. The hackers that infiltrated MGM’s computer systems are said to have used a low-tech social engineering technique dubbed “vishing” that just about any company is susceptible to, including IBM i shops.

    The systems that hackers shut down on September 11 may or may not be IBM i servers or connected to them. MGM has been an IBM i user in the past, just …

    Read more
  • Capture Point Restore: The Perfect Companion For High Availability

    December 12, 2022 Ash Giddings

    Businesses are constantly challenged by cyberattacks, coupled by their ever-increasing diverse nature. Ransomware and malicious data deletion or corruption can originate from both inside or outside of the business and staying out of the headlines by preventing attacks or at worst limiting the impact is high on the agenda for many.

    There’s seemingly never a day goes by without a prominent attack being reported, damaging both the tangible capabilities to conduct business at the time, combined with intangible ongoing damage to business reputation that these destructive incidents invariably bring.

    Many businesses have wisely invested in high availability for their IBM …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Spring IBM i Tech Refreshes Will Come A Bit Later This Year
  • You Are Much More Than Power Systems, And So Are We
  • Startup Seeks The “Golden Path” for IBM i Modernization
  • What Can IBM Do To Make The Future Power S1112 Mini System Compelling?
  • IBM i PTF Guide, Volume 28, Number 15
  • Bob 1.0 Users Bugged By Lack Of One Feature
  • Here Come The AI-Based Code Modernization Offerings
  • Guru: Cohesion First – What A Procedure Should Be Responsible For
  • IBM Offers Trade-Ins On Storage To Grease The Upgrade Skids
  • IBM i PTF Guide, Volume 28, Number 14

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle