Connect with us
Anglostratits

Business

How do we Build Powerful Defense with Data Storage (By Ning Yun)

Published

on

Data Storage

A Cybereason report shows that 49% of enterprises who pay the ransom either get only part of their data back, or none at all

JOHANNESBURG, South Africa, October 21, 2022/APO Group/ — 

By Ning Yun, Director of Data Storage Department of Huawei SAR (Huawei.com

Ransomware is striking at an alarming rate. Information technology research and consultancy company Gartner predicts, by 2025, at least 75% of IT organizations will face one or more attacks. Refined hacking tools and extortion strategies have made ransomware the biggest threat to individual, enterprise, and national data security.

Constant ransomware attacks cause huge damage

When ransomware strikes, it steals and encrypts valuable data. Encrypted data can be decrypted only by paying the hackers a ransom. Hackers, working through darknets, usually demand Bitcoin to make the payment as difficult as possible to trace. The damage ransomware creates is great, as are hackers’ profits.

According to leading investment consulting firm Cybersecurity Ventures, by 2031, ransomware is expected to attack a business, consumer, or device every 2 seconds. In 2021, this number was only 11 seconds. Even at that lower frequency, that same year, global ransomware damages reached US$20 billion — 61 times more than in 2015 (US$325 million). The largest ransom — so far — was US$70 million. But do ransoms solve the problem? No. A Cybereason report shows that 49% of enterprises who pay the ransom either get only part of their data back, or none at all. 80% of enterprises who pay the ransom are targeted a second time. Ransoms are also not the only problem: ransomware damages brands, causes long service interruptions, exposes enterprises to legal liability, and more. Such collateral damage can be enormous: as much as 23 times the ransom.

  • In March 2021, hackers encrypted 15,000 devices belonging to an insurance corporation. Vast numbers of customer data files were at risk of being leaked. The company paid US$40 million to retrieve the data.
  • In May 2021, ransomware halted all the operations of an oil pipeline giant for 11 days. Gasoline prices in the country rose to their highest level in seven years, leading to panic buying. The company paid a ransom of US$4.4 million.
  • In April 2022, a leading car manufacturer had to cut its annual production by 500,000 vehicles following an attack on its suppliers which resulted in a 1.4 TB data leak.
  • In May 2022, two attack waves caused a country to declare a cyber security emergency. They damaged basic services like healthcare, and even international trade.

There are many more examples. Hackers target large, high-value enterprises and industries. Government, energy, transportation, finance, manufacturing, and healthcare are their main objectives, but no one is safe.

Ransomware trends to know

Ransomware is extremely good at disguise. It has many ways to get into your system, for example storage, phishing emails, Trojans, social networks, and malicious insiders. It is difficult to detect and defend against. A typical attack encrypts or deletes all local data copies and can even target disaster recovery (DR) centers, making it impossible to quickly restore data. What follows, according to a ZDNet report, is an average of 16 business days system downtime. The average cost to recover from an attack, calculated by Sophos, is US$1.85 million.

There are four important ransomware trends:

Hackers focus on large enterprises and infrastructure

Instead of launching broad campaigns, ransomware attacks now increasingly focus on high-value targets. The research that hackers need to do for this approach to work is difficult, time-consuming — weeks or even months! — and expensive, but the potential profits make it worthwhile. Elaborate attacks make even previously well protected organizations potential victims, and also threaten government departments.

  • Ransomware as a Service (RaaS)

Rapid development of network and information technologies as well as encrypted digital currencies has created a hotbed for malicious actors. Ransomware operators now sell ransomware-related services to other attackers through customized solutions, memberships, or subscriptions. This lowers the barrier to entry for launching ransomware attacks, resulting in explosive ransomware growth.

Double extortion becoming the new normal

Ransomware is not limited to encrypting data and demanding ransoms. Attackers also steal data, and threaten to leak it. Even if an enterprise has a recent backup, it still cannot risk a leak of confidential information and subsequent public scrutiny and compliance proceedings.

A typical attack encrypts or deletes all local data copies and can even target disaster recovery (DR) centers, making it impossible to quickly restore data

APT-like attack capabilities

Advanced Persistent Threat (APT) refers to a complex continuous network attack customized by expert attackers to take full advantage of a victim’s vulnerabilities. Ransomware attacks, featuring greater and greater precision and planning, are beginning to show a strong resemblance to APT attacks.

Data security needs

Complex ransomware poses a great challenge for many current defense measures. Traditional data security protection focuses on the network (such as the firewall and security gateways) and on hosts to prevent ransomware intrusions and limit spread. This, however, neglects ransomware’s ability to disguise itself and lurk in the system for a long time in order to get access permissions to a large volume of key data. In other words, once the system is infected, traditional data security protection is useless. A better solution is needed.

The Defense-in-Depth framework developed by defense contractor Northrop Grumman provides good ideas on how to move forward and build stronger protection. This approach to cybersecurity features five defensive mechanism layers: perimeter, network, endpoint, application, and data security.

  • Perimeter and network security protection, established at the network layer, defends using firewalls, sandboxes, and situation awareness.
  • Endpoint and application security protection, established at the host layer, defends using access control, security patches and audits, and antivirus software.

The last layer, data security, is where data storage comes in. In the modern, digital age, data storage needs to do more than just store data. It needs to serve as the last line of defense: protect data with anti-tamper technologies, detect abnormal I/Os generated by ransomware, and prevent data leaks using encryption technologies. In addition to all this, it needs to ensure it is possible to recover clean, uninfected data by keeping data copies in backup storage and in a physically isolated zone.

Building powerful ransomware defense with professional storage

Providing dual protection with production and backup storage, Huawei ransomware protection storage solution uses four key technologies to build a complete solution which prevents viruses from hiding and stealing or tampering with data: ransomware detection, data anti-tampering, air gap replication, and end-to-end data encryption. Let’s take a look at why dual protection and the four key features are so effective:

  • Dual ransomware protection with both primary and backup storage

In this solution, both primary and backup (OceanProtect Backup Storage) storage provide all-round ransomware protection features, ensuring the system always has a clean data copy for quick service recovery. OceanProtect Backup Storage also provides an ultra-fast recovery speed: up to 172 TB/hour, five times faster than the benchmark in the industry. This helps enterprises slash service downtime and economic losses.

  • Four key technologies for comprehensive protection

Ransomware detection (ransomware has nowhere to hide): Huawei ransomware detection and analysis feature delivers 99.9% accuracy for production and backup storage before, during, and after attacks. Before an attack, the storage works to intercept ransomware before it has a chance to strike. If an attack does still occur, the storage acts quickly to secure the system, working with security devices such as firewalls to isolate hosts that send abnormal I/Os, preventing ransomware from spreading to other hosts. After the attack, the storage examines data copies to ensure they are clean.

Data tampering prevention (data cannot be modified): WORM file system and secure snapshot technology block file tampering. The WORM system supports setting a protection period, preventing modification or deletion of production or backup data for the duration of the period. Read-only secure snapshots provide similar protection: they do not allow deletion or modification of data during a configured protection period.

Physical isolation (clean data copies are physically isolated): Air-gap technology enables storing a clean copy of production and backup storage data in a physically isolated zone. Even if — unlikely though it may be — both production and backup storage are compromised, the isolation zone will have a clean copy that can be used to quickly restore services. Setting the replication Service Level Agreement (SLA) will automatically replicate periodic data copies from the production or backup storage to the isolation environment. Since the replication link is active only during replication, the possibility of ransomware accessing data in the isolation zone is relatively low. For added security, the isolation zone storage also features multi-layer data protection, supporting anti-tamper features such as secure snapshots.

End-to-end encryption (data will not be leaked): Huawei storage ensures zero data leaks on the storage transmission network and storage through encryption of: protocol, production and backup storage, air-gap replication link, and remote replication transmission of data and backup copies. Even if hackers break the storage or intrude the storage network, they have no access to the confidential data thanks to the encryption deployment.

End-to-end encryption (data will not be leaked): Huawei storage uses end-to-end encryption technology to ensure no data leaks either on storage devices or on the storage transmission network. The encryption covers protocol, production and backup data, the air-gap replication link, and remote data replication. Even if hackers manage to enter a system, they will not crack confidential data.

Defending against ransomware

Huawei’s ransomware protection storage solution is working 24/7 around the world for large customers in energy, finance, transportation, manufacturing, and government.

Better safe than sorry. Installing ransomware protection after the fact is too late. A comprehensive ransomware protection storage solution is the best way to stop or mitigate ransomware.

For more information about how you can build powerful defense for your data, visit our website (https://bit.ly/3RRI74g).

Distributed by APO Group on behalf of Huawei Enterprise.

Energy

High-Level Minister Roundup to Headline African Energy Week 2026

Published

on

African Energy Chamber

African Energy Week 2026 will convene ministers from Algeria, Ghana, Senegal, Zambia and Niger to spotlight oil, gas expansion, reforms and investment opportunities continentwide

CAPE TOWN, South Africa, March 13, 2026/APO Group/ –A high-level ministerial roundup will take center stage at this year’s African Energy Week (AEW) 2026 – taking place in Cape Town from 12–16 October –, convening some of the continent’s most influential energy leaders at a defining moment for Africa’s oil, gas and power sectors. As hydrocarbon expansion converges with accelerating energy transition strategies, the gathering is set to spotlight real-time project execution, regulatory reform and cross-border infrastructure that are actively reshaping Africa’s energy future.

 

Confirmed ministers to date include Algeria’s Minister of Energy and Renewable Energies Mourad Adjal, Ghana’s Minister for Energy and Green Transition Dr. John Abdulai Jinapor, Senegal’s Minister of Energy, Petroleum and Mines Birame Soulèye Diop, Zambia’s Minister of Energy Makozo Chikote and Niger’s Minster of Petroleum Hamadou Tinni.

 

Fresh from a March OPEC+ decision to lift output to 977,000 barrels of oil per day (bpd), Algeria enters AEW 2026 amid a $60 billion sector transformation. The country is also advancing a 500-well exploration drive and accelerating its 1.48 GW “Project of the Century” solar rollout. Gas exports to Europe remains central to the country, supported by hydrogen corridor planning and refinery expansion aimed at boosting capacity to 50 million tons by 2029.

 

Following license extension for Jubilee and TEN to 2040 and the late-2025 restart of the Tema Oil Refinery, Ghana is pushing a $3.5 billion upstream reinvestment plan while settling $500 million in gas arrears. A 1,200 MW state thermal plant and expanded gas processing at Atuabo anchor its gas-to-power shift, alongside a renewed upstream push in the Voltaian Basin.

The participation of these distinguished ministers underscores the scale of opportunity unfolding across Africa’s energy landscape and the urgency of aligning policy with capital

 

Senegal’s delegation comes on the back of strong production momentum, with the Sangomar oil field delivering 36.1 million barrels in 2025, outperforming forecasts, while the Greater Tortue Ahmeyim LNG development ramped up to 2.9 million tons per annum following first gas. Dakar is now prioritizing domestic gas through refinery upgrades at the SAR refinery and preparations for Sangomar Phase 2 to push output beyond 100,000 bpd.

 

Zambia is redefining its power mix after drought-induced hydro shortfalls. New solar capacity – including the 200 MW Chisamba expansion and 136 MW Itimpi Phase 2 – is part of a broader 2,500 MW diversification drive. Cabinet has approved major regional fuel pipelines, while the Energy Single Licensing System fast-tracks approvals. Lusaka targets 10 GW generation by 2030, with solar and wind rising to one-third of supply.

Niger’s presence reflects its emergence as a serious oil exporter, with the fully operational 1,950-km Niger-Benin pipeline now moving up to 90,000 bpd to international markets. Alongside uranium expansion and renewed cooperation with Algeria on upstream assets, Niamey is advancing digital oversight reforms and reinforcing energy sovereignty amid evolving geopolitical dynamics.

 

“The participation of these distinguished ministers underscores the scale of opportunity unfolding across Africa’s energy landscape and the urgency of aligning policy with capital,” says NJ Ayuk, Executive Chairman, African Energy Chamber. “Their leadership reflects a continent moving decisively from strategy to execution, creating a platform where investors can engage directly with the policymakers shaping Africa’s next wave of oil, gas and energy growth.”

 

At AEW 2026, this ministerial cohort will be well-positioned to offer investors direct insight into Africa’s most dynamic energy markets – where new barrels, new pipelines and new megawatts are reshaping regional growth trajectories in real time.

Distributed by APO Group on behalf of African Energy Chamber.

Continue Reading

Business

Enlit Africa 2026 Programme: 280+ speakers, African nuclear 2.0, Bruce Whitfield Business Breakfast

Published

on

Enlit Africa

The event, taking place 19-21 May 2026 at the Cape Town International Convention Centre, expects 7,200+ attendees and 250+ exhibitors, making it Africa’s largest gathering of energy and water professionals

CAPE TOWN, South Africa, March 12, 2026/APO Group/ –Enlit Africa (https://apo-opa.co/4cEX08g) has released its full 2026 conference programme, featuring 280+ speakers across 8 specialised tracks including a new African Nuclear 2.0 session covering Koeberg’s 20-year life extension and Ghana’s nuclear vendor selection process.

 

The event, taking place 19-21 May 2026 at the Cape Town International Convention Centre, expects 7,200+ attendees and 250+ exhibitors, making it Africa’s largest gathering of energy and water professionals.

Award-winning business journalist and best-selling author Bruce Whitfield will deliver the opening address at the Project & Investment Network Business Breakfast on 19 May, kicking off three days of strategic sessions, deal-making platforms, and technical masterclasses.

New programme content includes:

African Nuclear 2.0 – A dedicated session examining the transition from planning to execution, featuring:

Koeberg Nuclear Power Station’s successful 20-year life extension (Units 1 and 2 now licensed until 2044/2045)

Ghana’s progression to Phase 3 of its nuclear programme, evaluating US, Chinese, and Russian technology bids

West African Power Pool‘s 10 GW regional nuclear capacity target

Small Modular Reactor (SMR) deployment readiness across African grids

Independent Transmission Projects (ITP) – A new session exploring how private investment is unlocking Africa’s transmission bottleneck, featuring global case studies from India’s PowerGrid and lessons for scaling grid capacity across the continent.

Generation Masterclasses – Five interactive roundtables on gas-to-power, nuclear, hydro power, clean coal, and hydrogen.

AI in Africa’s Power Grid – Examining practical deployment realities, real-time analytics, and predictive maintenance applications already in operation across African utilities.

Conference sessions and technical hub sessions on the expo floor are CPD-accredited by the South African Institute of Electrical Engineers (SAIEE) and the South African Institution of Civil Engineering (SAICE).

Co-located platforms:

Water Security Africa features country playbooks from Namibia (55-year potable reuse programme), Uganda (NRW reduction from 42% to 32%), Cape Town (Day Zero recovery strategies), and sector-specific stewardship sessions with Harmony Gold, Heineken, Mediclinic, and Growthpoint Properties.

Project & Investment Network (P&IN), part of the new Level 2 Executive Experience, connects project developers, investors, African utility CEOs, and DFIs through structured matchmaking, ministerial dialogues, and project briefings. Over the past two years, P&IN has facilitated $3 billion in project pitches.

Utility CEO Forum brings together 35+ confirmed utility CEOs under Chatham House Rule for candid, off-the-record strategic discussions on unbundling, prosumer management, and financial sustainability.

Municipal Forum addresses South African municipalities’ distribution, metering, and revenue challenges, including sessions on NRW management, tariff reform, Cost of Supply studies, and electrifying informal settlements.

Technical Hub sessions on the exhibition floor offer free, CPD-accredited training across Power, Renewable Energy & Storage, and Water tracks, with confirmed speakers from Eskom, ENGIE SA, ACTOM, National Transmission Company South Africa (NTCSA), RenEnergy, and Matla Energy.

Site visits on 22 May include Koeberg Nuclear Power Station and the V&A Waterfront desalination plant.

Pass options:
Free expo pass registration: https://apo-opa.co/4bl2bYu

Free expo passes provide access to 250+ exhibitors and CPD-accredited Technical Hub sessions.

Delegate Pass:
Early bird registration closes 3 April 2026. Delegate passes start at R15,100 (Silver), with P&IN Executive passes at R32,000 including access to the Bruce Whitfield breakfast, Level 2 executive lounge, and investor matchmaking.

Download the full programme: https://apo-opa.co/3NwCble

Register: https://apo-opa.co/4cEX08g

Distributed by APO Group on behalf of VUKA Group.

Continue Reading

Business

Binance Secures Second Major Legal Victory in U.S. Court Under Anti-Terrorism Act in Two Weeks

Published

on

Binance

US Federal Court in Alabama Dismisses All Claims Against Binance in Latest Lawsuit Victory

JOHANNESBURG, South Africa, March 12, 2026/APO Group/ –Binance (www.Binance.com), the world’s largest cryptocurrency exchange, announced today that a U.S. federal court in Alabama has dismissed all claims against the company in a lawsuit alleging violations of the Anti-Terrorism Act (ATA). This marks Binance’s second major legal victory in an  ATA matter within one week, following their victory in the Southern District of New York.

A Full and Complete Legal Victory

In a detailed 19-page ruling, the Court found the plaintiffs’ complaint to be legally and factually deficient. The court’s decision to dismiss every claim across the board represents a decisive legal victory for Binance.

Sanctions compliance and terrorism financing are serious matters of law – they require evidence, legal rigour, and due process

The judge described the filing as a “shotgun pleading.” The complaint failed to clearly specify the claims and improperly grouped all defendants together without distinguishing individual conduct or liability. The ruling also emphasized that the plaintiffs did not meet the basic pleading standard to provide a “short and plain statement” of their claims.

Following the ruling, the court granted the plaintiffs until April 10, 2026, to file an amended complaint addressing the deficiencies identified. However, the judge warned that failure to adequately address these issues would result in dismissal of the entire case.

Building on Momentum and Upholding Legal Integrity

“This decision reinforces our unwavering commitment to protecting Binance and our community from unsubstantiated and bad-faith lawsuits,” shared Eleanor Hughes, General Counsel at Binance. “Sanctions compliance and terrorism financing are serious matters of law – they require evidence, legal rigour, and due process. Courts have now examined these claims on two separate occasions and found them to be without merit. These outcomes speak for themselves. We will not tolerate attempts to misuse the legal system to target our industry, and we remain as committed as ever to transparency, security, and lawful conduct in everything we do”.

This latest decision follows closely on the heels of Binance’s comprehensive victory in New York (https://apo-opa.co/46Xg0ev), where the Court similarly rejected allegations that the company assisted, participated in, or conspired with terrorists. Together, these rulings reflect Binance’s strong resolve to protect its platform and community.

Binance has consistently invested in industry-leading compliance infrastructure, regulatory engagement, and legal governance. The company will continue to vigorously defend itself against any attempts to bring unfounded claims or misrepresent its operations.

Distributed by APO Group on behalf of Binance.

Continue Reading

Trending