Advertise on DCNN Advertise on DCNN Advertise on DCNN
Saturday, June 14, 2025

Features


Paying attention to data centre storage cooling
Authored by Neil Edmunds, Director of Innovation, Iceotope With constant streams of data emerging from the IoT, video, AI and more, it is no surprise we are expected to generate 463EB of data each day by 2025. How we access and interact with data is constantly changing and is going to have a real impact on the processing and storage of that data. In just a few years, it's predicted that global data storage will exceed 200ZB with half of that stored in the cloud. This presents a unique challenge for hyperscale data centres and their storage infrastructure. According to Seagate, cloud data centres choose mass capacity hard disk drives (HDDs) to store 90% of their exabytes. HDDs are tried and tested technology, typically found in a 3.5in form factor. They continue to offer data centre operators cost effective storage at scale. The current top-of-the-range HDD features 20TB capacity. By the end of the decade that is expected to reach 120TB+, all within the existing 3.5in form factor. The practical implications of this show a need for improved thermal cooling solutions. More data storage means more spinning of the disks, higher speed motors, more actuators – all of which translates to more power being used. As disks go up in power, so does the amount of heat produced by them. Next, with the introduction of helium into the hard drives in the last decade, performance has not only improved, thanks to less drag on the disks, but the units are now sealed. There is also ESG compliance to consider. With data centres consuming 1% of global electricity demand and cooling power accounting for more than 35% of a data centre’s total energy consumption, pressure is on data centre owners to reduce this consumption. Comparison of cooling technologies Traditionally, data centre environments use air cooling technology. The primary way of removing heat with air cooling methods is by pulling increasing volumes of airflow through the chassis of the equipment. Typically, there is a hot aisle behind the racks and a cold aisle configuration in front of the racks which dissipates the heat by exchanging warm air with cooler air. Air cooling is widely deployed and well understood. It is also well engrained into nearly every data centre around the world. However, as the volume of data evolves, it is becoming increasingly likely that air cooling will no longer be able to ensure an appropriate operating environment for energy dense IT equipment. Technologies like liquid cooling are proving to be a much more efficient way to remove heat from IT equipment. Precision liquid cooling, for example, circulates small volumes of dielectric fluid across the surface of the server, removing almost 100% of the heat generated by the electronic components. There are no performance throttling hotspots and no front to back air cooling, or bottom to top immersion constraints which are present in tank solutions. While initial applications of precision liquid cooling have been in a sealed chassis for cooling server components, given the increased power demands of HDD, storage devices are also an ideal application. High density storage demands With high density HDD, traditional air cooling pulls air through the system from front to back. What typically occurs in this environment is that disks in the front become much cooler than those in the back. As the cold air comes and travels through the JBOD device, the air gets hotter. This can result in a 20°C or more temperature differential between the discs at the front and back of the unit depending on the capacity of the hard drive. For any data centre operator, consistency is key. When disks are varying by nearly 20°C from front to back, there is inconsistent wear and tear on the drives leading to unpredictable failure. The same goes for variance across the height of the rack, as lower devices tend to consume the cooler air flow coming up from the floor tiles. Liquid cooling for storage While there will always be variances and different tolerances taking place within any data centre environment, liquid cooling can mitigate for these variances and improve consistency. In 2022, Meta published a study showcasing how an air cooled, high density storage system was reengineered to utilise single phase liquid cooling. The study found that precision liquid cooling was a more efficient means of cooling the HDD racks with the following results: The variance in temperature of all HDDs was just 3°C, regardless of location inside the JBODs. HDD systems could operate reliably in rack water inlet temperatures up to 40°C. System-level cooling power was less than 5% of the total power consumption. Mitigating acoustic vibrational issues. While consistency is a key benefit, cooling all disks at a higher water temperature is important too. This means data centre operators do not need to provide chilled water to the unit. Reduced resource consumption – electrical, water, space, audible noise – all lead to greater reduction in TCO and improved ESG compliance. Both of which are key benefits for today’s data centre operators. As demand for data storage continues to escalate, so will the solutions needed by hyperscale data centre providers to efficiently cool the equipment. Liquid cooling for high density storage is proving to be a viable alternative as it cools the drives at a more consistent temperature and removes vibration from fans, with lower overall end-to-end power consumption and improved ESG compliance. At a time when data centre operators are under increasing pressure to reduce energy consumption and improve sustainability metrics, this technology may not only be good for the planet, but also good for business. Enabling innovation in storage systems Today’s HDDs are designed with forced air cooling in mind, so it stands to reason that air cooling will continue to play a role in the short term. For storage manufacturers to embrace new alternatives demonstrations of liquid cooling technology, like the one Meta conducted, are key to ensuring adoption. Looking at technology trends moving forward, constantly increasing fan power on a rack will not be a long term sustainable solution. Data halls are not getting any larger and costs to cool a rack are increasing. The need for more data storage capacity at greater density is exponentially growing. Storage designed for precision liquid cooling will be smaller, use fewer precious materials and components, perform faster and fail less often. The ability to deliver a more cost effective HDD storage solution in the same cubic footprint, delivers not only a TCO benefit but contributes to greater ESG value as well. Making today's technology more efficient and removing limiting factors for new and game changing data storage methods can help us meet the global challenges we face and is a step forward towards enabling a better future. Click here for more thought leadership.

GovAssure, cyber security and NDR
By Ashley Nurcombe, Senior Systems Engineer UK&I, Corelight We live in a world of escalating digital threats to government IT systems. The public sector has recorded more global incidents and data breaches than any other over the past year, according to a recent Verizon study. That’s why it is heartening to see the launch of the new GovAssure scheme, which mandates stringent annual cyber security audits of all government departments, based on a National Cyber Security Centre (NCSC) framework. Now the hard work starts. As government IT and security leads begin to work through the strict requirements of the Cyber Assessment Framework (CAF), they will find network detection and response (NDR) increasingly critical to these compliance efforts. Why we need GovAssure GovAssure is the government's response to surging threat levels in the public sector. It is not hard to see why it is such an attractive target. Government entities hold a vast range of lucrative citizen data which could be used to carry out follow-on identity fraud. Government services are also a big target for extortionists looking to hold departments hostage with disruptive ransomware. And there's plenty of classified information in there for foreign powers to go after to gain a geopolitical advantage. Contrary to popular belief, most attacks are financially motivated (68%), rather than nation-state attempts at espionage (30%). That means external, organised crime gangs are the biggest threat to government security. However, internal actors account for nearly a third (30%) of breaches, and collaboration between external parties and government employees or partners accounts for 16% of data breaches. When the cause of insider risk is malicious intent rather than negligence, it can be challenging to spot because staff may be using legitimate access rights and going to great lengths to achieve their goals without being noticed. Phishing and social engineering are still among threat actors' most popular attack techniques. They target distracted and/or poorly trained employees to harvest government logins and/or personal information. Credentials are gathered in an estimated third of government breaches, while personal information is taken in nearly two-fifths (38%). Arguably the shift to hybrid working has created more risk here as staff admit being more distracted when working from home (WFH), and personal devices and home networks may be less well protected than their corporate counterparts. The growing cyber attack surface Several other threat vectors are frequently probed by malicious actors, including software vulnerabilities. The new Freedom of Information data reveals a worrying number of government assets are now using outdated software that vendors no longer support. Connected Internet of Things (IoT) devices are an increasingly popular target, especially those with unpatched firmware or factory default/easy to guess passwords. Such devices can be targeted to gain a foothold in government networks and/or to sabotage smart city services. Finally, the government has a significant supply chain risk management challenge. Third-party suppliers and partners are critical to efficiently delivering government services. But they also expand the attack surface and introduce additional risk, especially if third parties aren't properly and continuously vetted for security risks. Take the recent ransomware breach at Capita, an outsourcing giant with billions of pounds of government contracts. Although investigations are still ongoing, as many as 90 of the firm's clients have already reported data breaches due to the attack. What the CAF demands In this context, GovAssure is a long overdue attempt to enhance government resilience to cyber risk. In fact, Government Chief Security Officer, Vincent Devine, describes it as a "transformative change" in its approach to cyber that will deliver better visibility of the challenges, set clear expectations for departments and empower security pros to strengthen the investment case. Yet delivering assurance will not be easy. The CAF lists 14 cyber security and resilience principles, plus guidance on using and applying the principles. These range from risk and asset management to data, supply chain and system security, network resilience, security monitoring and much more. One thing becomes clear, visibility into network activity is a critical foundational capability on which to build CAF compliance programmes. How NDR can help NDR (Network Detection and Response) tools provide visibility. This kind of visibility will enable teams to map assets better, ensure the integrity of data exchanges with third parties, monitor compliance and detect threats before they have a chance to impact the organisation. Although the CAF primarily focuses on finding known threats, government IT leaders should consider going further, with NDR tooling designed to go beyond signature-based detection to spot unknown but potentially malicious behaviour.  Such tools might use machine learning algorithms to learn what regular activity looks like to better spot the signs of compromise. If they do, IT leaders should avoid purchasing black box tools that don't allow for flexible querying or provide results without showing their rationale. These tools can add opacity and assurance/compliance headaches. Open-source tools based on Zeek may offer a better and more reasonably priced alternative. Ultimately, there are plenty of challenges for departments looking to drive GovAssure programmes. Limited budgets, in-house skills, complex cyber threats, and a growing compliance burden will all take its toll. But by reaching out to private sector security experts, there is a way forward. For many, that journey will begin with NDR to safeguard sensitive information and critical infrastructure. Click here for more thought leadership.

Castrol and Hypertec accelerate immersion cooling technology
Castrol has announced its collaboration with Hypertec. To accelerate the widespread adoption of Hypertec’s immersion cooling solutions for data centres, supported by Castrol’s fluid technology, both companies will collaborate to develop and test the immersion cooling technology at Castrol’s global headquarters in Pangbourne, UK. Castrol announced in 2022 that it will invest up to £50m investment in its headquarters at Pangbourne. It is pleased to have the first systems in place and fully functional for research to begin on furthering immersion cooling technologies across systems, servers and fluids to provide world class, integrated solutions to customers. Hypertec is the first server OEM to join Castrol in its drive to accelerate immersion cooling technology. The two will leverage Castrol’s existing collaboration with Submer, a leader in immersion cooling technology, who has provided its SmartPod and MicroPod tank systems to the Pangbourne facility, which have been modified to test new fluids and new server technologies. Working together, Castrol will be able to continue to develop its offers for data centre customers and look to accelerate the adoption of immersion cooling as a path to explore more sustainable and more efficient data centre operations. With immersion cooling, water usage and the power consumption needed to operate and cool server equipment can be significantly reduced. Click here for latest data centre news.

Vertiv's guidance on data centres during extreme heat
Summer in the northern hemisphere has just started, but already devastating heatwaves have washed over much of the US, Mexico, Canada, Europe and Asia. Widespread wildfires in Canada have triggered air quality alerts across that country and much of the eastern half of the US and similar extreme heat events across Asia have caused widespread power outages, Europe also continues to break heat records as the fastest warming continent. The data centre cooling experts at Vertiv have issued updated guidance for managing the extreme heat. Climate change has made the past eight years the hottest on record, but with an El Niño weather pattern compounding the issue this year, many forecasts anticipate record-breaking temperatures in 2023. The sizzling outdoor temperatures and their aftermath create significant challenges for data centre operators who already wage a daily battle with the heat produced within their facilities. There are steps organisations can take to mitigate the risks associated with extreme heat. These include: Clean or change air filters: The eerie orange haze that engulfed New York was a powerful visual representation of one of the most immediate and severe impacts of climate change. For data centre operators, it should serve as a reminder to clean or change air filters in their data centre thermal management systems and HVAC systems. Those filters help to protect sensitive electronics from particulates in the air, including smoke from faraway wildfires. Accelerate planned maintenance and service: Extreme heat and poor air quality tax more than data centre infrastructure systems. Electricity providers often struggle to meet the surge in demand that comes with higher temperatures, and outages are common. Such events are not the time to learn about problems with UPS system or cooling unit. Cleaning condenser coils and maintaining refrigerant charge levels are examples of proactive maintenance that can help to prevent unexpected failures. Activate available efficiency tools: Many modern UPS systems are equipped with high efficiency eco-modes that can reduce the amount of power the system draws from the grid. Heatwaves like those seen recently push the grid to its limits, meaning any reductions in demand can be the difference between uninterrupted service and a devastating outage. Leverage alternative energy sources: Not all data centres have access to viable alternative energy, but those that do should leverage off-grid power sources. These could include on/off-site solar arrays or other alternate sources, such as off-site wind farms and lithium-ion batteries, to enable peak shifting or shaving. Use of generators is discouraged during heat waves unless an outage occurs. Diesel generators produce more greenhouse gas and emissions associated with climate change than backup options that use alternative energy. In fact, organisations should postpone planned generator testing when temperatures are spiking. “These heatwaves are becoming more common and more extreme, placing intense pressure on utility providers and data centre operators globally,” says John Niemann, Senior Vice President for the Global Thermal Management Business for Vertiv. “Organisations must match that intensity with their response, proactively preparing for the associated strain not just on their own power and cooling systems, but on the grid as well. Prioritising preventive maintenance service and collaborating with electricity providers to manage demand can help reduce the likelihood of any sort of heat-related equipment failure.” “Again this year, parts of Europe are experiencing record setting heat, and in our business we specifically see the impact on data centres. Prioritising thermal redundancy and partnering with a service provider with widespread local presence and first-class restoration capabilities can make the difference in data centre availability,” says Flora Cavinato, Global Service Portfolio Director. “Swift response times and proactive maintenance programs can help organisations to sustain their business operations while effectively optimising their critical infrastructure.” Click here for more on Vertiv.

SentinelOne bolsters India’s cyber defences
SentinelOne has announced the launch of a virtual data centre in Mumbai that will enable the growing number of Indian companies which rely on SentinelOne to shield their business from cyber attacks in a simple, compliant way.  “Cyber criminals are moving faster than ever, and companies must move with even greater speed to thwart their actions,” says Diwa Dayal, Managing Director, India and SAARC, SentinelOne. “At SentinelOne, we understand the stringent reporting requirements that Indian organisations must meet. And with the launch of our local data centre, we are uniquely positioned to help them do it.”Cyber attacks are on the rise. And no industry is immune. But some are more vulnerable than others. With SentinelOne, banking, financial services, healthcare, government and other organisations that are sensitive to data residency and privacy needs can leverage AI-powered protection to keep their assets secure.The company’s Singularity platform is a unified solution that combines endpoint protection, cloud security, identity threat detection and response and data ingestion with analytics in a single console. Using a native backend and the industry’s most performant security data lake, the solution offers complete data localisation and sovereignty with an India-based AWS Point-of-Presence (PoP). It is also the first open XDR solution in India that delivers complete data localisation and sovereignty. Hosted by its strategic partner, AWS, the Mumbai cloud data centre will provide direct, high-performance access to the Singularity platform, while allowing organisations to store their logs within Indian borders.“At SentinelOne, our mission is to defeat every attack, every second, of every day,” says Diwa. “And our new data centre is a testament to our commitment to India and to keeping its infrastructure and citizens safe as the threat landscape evolves.” Click here for more news on data centres.

Schneider Electric launches contractor program
Schneider Electric has announced the launch of a new partner program in the UK and Ireland. The Contractor Program offers online resources and digital tools via mySchneider portal to help contractors quickly and efficiently meet customer demands. It also offers opportunities to generate more business and training to support sales activities, as well as advice on sustainable solutions. In addition to the above, it includes the following benefits depending on whether the contractor is a registered, premier or premier plus customer: Personalised news, information and promotions. Advanced commercial and technical support. Digital platforms and tools. Training and education resources. Invitations to local partner events. Partner locator listing. EcoXpert badge eligibility. Hands-on training. A new world of energy The launch is part of Schneider Electric’s strategy to mitigate the energy crisis by calling on its customers, partners and suppliers to reduce the amount of energy used in their day-to-day operations and buildings and to select more sustainable solutions. In response to the ways in which the energy landscape has shifted dramatically in recent years, it has developed the mySchneider Contractor Program to answer the following challenges: demands for more electrification to reduce the usage of fossil fuels; an increase in cybersecurity; and demands from the market for multidirectional energy supplies. In the long term, the convergence of electric and digital brings disruptive new possibilities for contractors. It enables them to harness the potential for efficiency and sustainability, and more critically, in the near term, to directly impact energy security, an issue that has been front of mind for the UK and Irish governments and their citizens in recent years. David Williams, Vice President of Transactional Business at Schneider Electric, says, “As a global business, we understand the challenges our contractors and partners are facing around the world in light of the economic and political landscape and energy crisis. With the launch of the mySchneider Contractor Program, we are giving our partners priority access to our global partner ecosystem. We hope that by rewarding our contractors in this way that they will be empowered to stay ahead of the competition by offering the latest sustainable solutions to their customers.” Click here for latest updates on Schneider Electric.

Cubbit appoints two data storage veterans
Cubbit has announced the appointment of two data storage world veterans to its executive team: Richard Czech as Chief Revenue Officer and Enrico Signoretti as VP, Product & Partnerships.   The expansion of the leadership team reinforces the company’s goals around international growth and the realisation of strategic market opportunities in cloud and edge computing. This news follows the launch of Cubbit’s international advisory board, consisting of initial members, Nicolas Ott, Alec Ross and Mikko Suonenlahti.  Richard Czech, the new CRO, has more than 30 years of experience as an entrepreneur and key executive in the storage industry. For the past six years, he was VP EMEA of Sales at Wasabi Technologies, where he led the European go-to-market strategy from startup to unicorn, growing the partner network from zero to thousands and selling hundreds of PB of storage, when it was valued at over $1bn. Prior to Wasabi, he held key positions such as the European Sales Executive for DataXion, CEO of Lightsand Communications, VP of Technology, EMEA at ADIC, and Founder and President of InterBackup.  In his role as Chief Revenue Officer for Cubbit, Richard’s unique experience will lend itself to driving business growth by taking a holistic approach in overseeing the entire revenue cycle, with the alignment of teams, operations and systems, around the customer experience in the go-to market process.  Enrico Signoretti has over 30 years of experience in the IT industry, having held various roles including IT manager, consultant, head of product strategy, IT analyst, and advisor. He is an internationally renowned visionary author, blogger and speaker on next-generation technologies. Over the past four years, Enrico has kept his finger on the pulse of the evolving storage industry as the Head of Research Product Strategy at GigaOm. He has worked closely and built relationships with top visionaries, CTOs, and IT decision makers worldwide. Enrico has also contributed to leading global online sites, with over 40 million readers for enterprise technology news.  Enrico will be drawing upon his vast experience to contribute towards the technical vision, initiatives and strategy of Cubbit’s DS3 solution and the overall business goals, as well as expanding the company’s network of strategic partners, fostering relationships with leading industry players. 

VMware unveils research on NHS data storage
VMware has unveiled a research sharing that the majority (87%) of UK consumers believe it is important that their NHS patient data is stored in the UK. The study of more than 2,000 UK citizens has revealed that people still have cyber security concerns when it comes to where their personal and sensitive data is stored. Of those who stated it is important for their data to be stored in the UK, more than a third (39%) think that their data stored within the country’s national borders would ensure it complies with UK data privacy regulations. A fifth (22%) do not trust other countries to safeguard their data as well as the UK, and 21% think it will be less susceptible to foreign cyber threats or access foreign entities. Despite this, the research shares a good level of trust in the NHS when it comes to storing and analysing patient data. For instance, 59% of respondents expressed confidence in the NHS's ability to safeguard their sensitive information. But when asked about where their data is stored, most UK public had doubts on their data residing outside of their national boundaries. Businesses share the same attitude. 42% of business leaders are extremely concerned about their critical data being managed by US cloud providers, and 62% have expressed that their current clouds are not meeting their data sovereignty requirements, according to the latest IDC research. Many NHS and social care providers today use non-national public clouds. This means that patient data is currently hosted in a provider currently deemed adequate by the UK, however, if this is a non-national provider, the data could be subject to external jurisdictional control. “This consumer opinion matters as it echoes business sentiment. These findings demonstrate the increasing importance of data integrity and sovereignty in helping the NHS, among other highly regulated industries, realise and unlock the true value of their sensitive and critical data," says Guy Bartram, Cloud Evangelist EMEA, VMware. “By embracing cloud sovereignty, the NHS can build public trust and assertively maintain governance, fortify data protection and help unlock the true value of critical and sensitive patient data in delivering patient services.” "While there are vast rewards to be harvested through applying AI to healthcare data, we have to remember that each data point relates to a patient, and every patient should trust that their privacy is maintained,” says Darren Adcock, Senior Product Manager, Redcentric. “By harnessing the power of AI and advanced technologies within a secure and sovereign cloud framework, the NHS ensures that groundbreaking advancements in healthcare never compromise patient privacy and trust. Sovereign clouds serve as a pivotal enabler, allowing the NHS to drive progress responsibly, ethically, and with the utmost dedication to patient wellbeing.” Sovereignty extends beyond where data is stored, but also how it is used by platforms such as AI, which analyses the data to feed algorithms. The general public surveyed hold diverse opinions regarding AI in healthcare, with 45% open to its use for improved services and 44% happy with the NHS using the technology to process their patient data, if it helped the NHS to process diagnostic tests faster. However, concerns exist, with 25% saying they are against the NHS using AI to process their patient data. “Ongoing digital transformation and the increased use of emerging technologies such as AI, have spurred both excitement for true innovation to revolutionise our NHS, but also a new urgency for how this boom in data will be securely managed and stored,” says Dr Will Venters, Associate Professor of Information Systems, London School of Economics. “With the increased use of multiple clouds to create, store and distribute apps, which the NHS needs, relies on from frontline clinicians through to optimising operations, it is essential to patient trust that the NHS protects sensitive patient data, and this can be achieved by protecting it with sovereign clouds. AI has created new data opportunities so it is critical the NHS can make better use of its data, to build a resilient and patient-centric healthcare system that the UK needs.”

Acronis releases Mid-Year Cyberthreats Report
Acronis has released its ‘Mid-Year Cyberthreats Report, from Innovation to Risk: Managing the Implications of AI-driven Cyberattacks’. The study is based on data captured from many global endpoints and provides insight into the evolving cyber security landscape. It also uncovers the growing utilisation of generative AI systems by cybercriminals to craft malicious content and execute sophisticated attacks. The biannual threat report highlights ransomware as the dominant risk to small and medium size businesses. And while the number of new ransomware variants continues to decline, ransomware attacks’ severity remains significant. Equally concerning is the growing prominence of data stealers who leverage stolen credentials to gain unauthorised access to sensitive information.  “The volume of threats in 2023 has surged relative to last year, a sign that criminals are scaling and enhancing how they compromise systems and execute attacks,” says Candid Wüest, Acronis VP of Research. “To address the dynamic threat landscape, organisations need agile, comprehensive, unified security solutions that provide the necessary visibility to understand attacks, simplify context, and provide efficient remediation of any threat, whether it may be malware, system vulnerability, and everything in between.” According to the report's findings, phishing is the primary method criminals leverage to unearth login credentials. In the first half of 2023 alone, the number of email-based phishing attacks has surged 464%, when compared to 2022. There has also been a 24% increase in attacks per organisation. Over the same frame, Acronis-monitored endpoints observed a 15% increase in the number of files and URLs per scanned email. Cyber criminals have also tapped into the burgeoning large language model (LLM)-based AI market, using platforms to create, automate, scale, and improve new attacks through active learning.  The cyberattack landscape is evolving Cyber criminals are becoming more sophisticated in their attacks, using AI and existing ransomware code to drill deeper into victims’ systems and extract sensitive information. AI-created malware is adept at avoiding detection in traditional antivirus models, and public ransomware cases have exploded relative to last year. Acronis picks up data about how these cybercriminals operate and recognises how some attacks have become more intelligent, sophisticated and difficult to detect. Drawing from research and analysis, key findings from the report include: Acronis blocked almost 50m URLs at the endpoint in Q1 2023, a 15% increase over Q4 2022.  There were 809 publicly mentioned ransomware cases in Q1 2023, with a 62% spike in March over the monthly average of 270 cases. In Q1 2023, 30.3% of all received emails were spam and 1.3% contained malware or phishing links.   Each malware sample lives an average of 2.1 days in the wild before it disappears. 73% of samples were only seen once. Public AI models are proving an unwitting accomplice for criminals looking for source code vulnerabilities, creating attacks and developing fraud prevention-thwarting attacks like deep fakes.  Cybercriminal gangs phish to acquire credentials, extract data and dollars, of note: Phishing remained the most popular form of stealing credentials, making up 73% of all attacks. Business email compromises (BECs) were second, at 15%. The LockBit gang was responsible for major data breaches. Clop breached a mental health provider’s system, affecting the personal and HIPAA-covered data of more than 783,000 individuals. BlackCat stole more than 2TB of secret military data, which included personal information of employees and customers, from an Indian industrial manufacturer. Vice Society compromised 1,200 servers and the personal information of 43,000 students, 4,000 academic staff and 1,500 administrative staff at the University of Duisburg-Essen in Germany. Breaches demonstrate major security concerns Traditional cyber security methods and lack of action let attackers in, the report shares: There is a lack of strong security solutions in place that can detect zero-day vulnerability exploitations. Organisations often fail to update vulnerable software in a timely manner, long after a fix becomes available.   Linux servers face inadequate protection against the cybercriminals who are increasingly going after them.   Not all organisations follow proper data backup protocol, including the 3-2-1 rule. With these trends in mind, Acronis emphasises the need for proactive cyber protection measures. A sound cybersecurity posture requires a multi-layered solution that combines anti-malware, EDR, DLP, email security, vulnerability assessment, patch management, RMM, and backup capabilities. Leveraging an advanced solution that combines AI, machine learning, and behavioural analysis can help mitigate the risks posed by ransomware and data stealers.

Node4 announces the acquisition of ThreeTwoFour
Node4 has announced the acquisition of ThreeTwoFour to strengthen its cyber security offering and expand in the finance and banking sector. This is its third significant growth purchase in the last 18 months, having also bought risual and Tisski. ThreeTwoFour is renowned for its extensive suite of information security services, including programme delivery, cyber strategy, risk and control assessment, and governance. It also brings strong experience across the financial services sector. In addition, its expertise in M&A Cyber Due Diligence adds further capabilities to the company’s solutions and services portfolio.  The acquisition significantly enhances Node4’s security and transformation capabilities, particularly for enterprise-level clients. Drawing on ThreeTwoFour’s capabilities, the company will also be better equipped to meet the increasing requirements in the public sector and government frameworks for effective cyber security solutions.  Alex Coburn, Founder, ThreeTwoFour, along with his leadership team, will remain with the business as it integrates with Node4. The brand will also function as the consultative arm of security practice.   With its core team based in the UK, ThreeTwoFour is also supported by specialists working remotely from all over the world. Alongside its Cyber Essentials Certification, the firm provides expertise in various other sectors, such as data loss prevention, risk management and security architecture.



Translate »