Connect with us
Anglostratits

Business

How do we Build Powerful Defense with Data Storage (By Ning Yun)

Published

on

Data Storage

A Cybereason report shows that 49% of enterprises who pay the ransom either get only part of their data back, or none at all

JOHANNESBURG, South Africa, October 21, 2022/APO Group/ — 

By Ning Yun, Director of Data Storage Department of Huawei SAR (Huawei.com

Ransomware is striking at an alarming rate. Information technology research and consultancy company Gartner predicts, by 2025, at least 75% of IT organizations will face one or more attacks. Refined hacking tools and extortion strategies have made ransomware the biggest threat to individual, enterprise, and national data security.

Constant ransomware attacks cause huge damage

When ransomware strikes, it steals and encrypts valuable data. Encrypted data can be decrypted only by paying the hackers a ransom. Hackers, working through darknets, usually demand Bitcoin to make the payment as difficult as possible to trace. The damage ransomware creates is great, as are hackers’ profits.

According to leading investment consulting firm Cybersecurity Ventures, by 2031, ransomware is expected to attack a business, consumer, or device every 2 seconds. In 2021, this number was only 11 seconds. Even at that lower frequency, that same year, global ransomware damages reached US$20 billion — 61 times more than in 2015 (US$325 million). The largest ransom — so far — was US$70 million. But do ransoms solve the problem? No. A Cybereason report shows that 49% of enterprises who pay the ransom either get only part of their data back, or none at all. 80% of enterprises who pay the ransom are targeted a second time. Ransoms are also not the only problem: ransomware damages brands, causes long service interruptions, exposes enterprises to legal liability, and more. Such collateral damage can be enormous: as much as 23 times the ransom.

  • In March 2021, hackers encrypted 15,000 devices belonging to an insurance corporation. Vast numbers of customer data files were at risk of being leaked. The company paid US$40 million to retrieve the data.
  • In May 2021, ransomware halted all the operations of an oil pipeline giant for 11 days. Gasoline prices in the country rose to their highest level in seven years, leading to panic buying. The company paid a ransom of US$4.4 million.
  • In April 2022, a leading car manufacturer had to cut its annual production by 500,000 vehicles following an attack on its suppliers which resulted in a 1.4 TB data leak.
  • In May 2022, two attack waves caused a country to declare a cyber security emergency. They damaged basic services like healthcare, and even international trade.

There are many more examples. Hackers target large, high-value enterprises and industries. Government, energy, transportation, finance, manufacturing, and healthcare are their main objectives, but no one is safe.

Ransomware trends to know

Ransomware is extremely good at disguise. It has many ways to get into your system, for example storage, phishing emails, Trojans, social networks, and malicious insiders. It is difficult to detect and defend against. A typical attack encrypts or deletes all local data copies and can even target disaster recovery (DR) centers, making it impossible to quickly restore data. What follows, according to a ZDNet report, is an average of 16 business days system downtime. The average cost to recover from an attack, calculated by Sophos, is US$1.85 million.

There are four important ransomware trends:

Hackers focus on large enterprises and infrastructure

Instead of launching broad campaigns, ransomware attacks now increasingly focus on high-value targets. The research that hackers need to do for this approach to work is difficult, time-consuming — weeks or even months! — and expensive, but the potential profits make it worthwhile. Elaborate attacks make even previously well protected organizations potential victims, and also threaten government departments.

  • Ransomware as a Service (RaaS)

Rapid development of network and information technologies as well as encrypted digital currencies has created a hotbed for malicious actors. Ransomware operators now sell ransomware-related services to other attackers through customized solutions, memberships, or subscriptions. This lowers the barrier to entry for launching ransomware attacks, resulting in explosive ransomware growth.

Double extortion becoming the new normal

Ransomware is not limited to encrypting data and demanding ransoms. Attackers also steal data, and threaten to leak it. Even if an enterprise has a recent backup, it still cannot risk a leak of confidential information and subsequent public scrutiny and compliance proceedings.

A typical attack encrypts or deletes all local data copies and can even target disaster recovery (DR) centers, making it impossible to quickly restore data

APT-like attack capabilities

Advanced Persistent Threat (APT) refers to a complex continuous network attack customized by expert attackers to take full advantage of a victim’s vulnerabilities. Ransomware attacks, featuring greater and greater precision and planning, are beginning to show a strong resemblance to APT attacks.

Data security needs

Complex ransomware poses a great challenge for many current defense measures. Traditional data security protection focuses on the network (such as the firewall and security gateways) and on hosts to prevent ransomware intrusions and limit spread. This, however, neglects ransomware’s ability to disguise itself and lurk in the system for a long time in order to get access permissions to a large volume of key data. In other words, once the system is infected, traditional data security protection is useless. A better solution is needed.

The Defense-in-Depth framework developed by defense contractor Northrop Grumman provides good ideas on how to move forward and build stronger protection. This approach to cybersecurity features five defensive mechanism layers: perimeter, network, endpoint, application, and data security.

  • Perimeter and network security protection, established at the network layer, defends using firewalls, sandboxes, and situation awareness.
  • Endpoint and application security protection, established at the host layer, defends using access control, security patches and audits, and antivirus software.

The last layer, data security, is where data storage comes in. In the modern, digital age, data storage needs to do more than just store data. It needs to serve as the last line of defense: protect data with anti-tamper technologies, detect abnormal I/Os generated by ransomware, and prevent data leaks using encryption technologies. In addition to all this, it needs to ensure it is possible to recover clean, uninfected data by keeping data copies in backup storage and in a physically isolated zone.

Building powerful ransomware defense with professional storage

Providing dual protection with production and backup storage, Huawei ransomware protection storage solution uses four key technologies to build a complete solution which prevents viruses from hiding and stealing or tampering with data: ransomware detection, data anti-tampering, air gap replication, and end-to-end data encryption. Let’s take a look at why dual protection and the four key features are so effective:

  • Dual ransomware protection with both primary and backup storage

In this solution, both primary and backup (OceanProtect Backup Storage) storage provide all-round ransomware protection features, ensuring the system always has a clean data copy for quick service recovery. OceanProtect Backup Storage also provides an ultra-fast recovery speed: up to 172 TB/hour, five times faster than the benchmark in the industry. This helps enterprises slash service downtime and economic losses.

  • Four key technologies for comprehensive protection

Ransomware detection (ransomware has nowhere to hide): Huawei ransomware detection and analysis feature delivers 99.9% accuracy for production and backup storage before, during, and after attacks. Before an attack, the storage works to intercept ransomware before it has a chance to strike. If an attack does still occur, the storage acts quickly to secure the system, working with security devices such as firewalls to isolate hosts that send abnormal I/Os, preventing ransomware from spreading to other hosts. After the attack, the storage examines data copies to ensure they are clean.

Data tampering prevention (data cannot be modified): WORM file system and secure snapshot technology block file tampering. The WORM system supports setting a protection period, preventing modification or deletion of production or backup data for the duration of the period. Read-only secure snapshots provide similar protection: they do not allow deletion or modification of data during a configured protection period.

Physical isolation (clean data copies are physically isolated): Air-gap technology enables storing a clean copy of production and backup storage data in a physically isolated zone. Even if — unlikely though it may be — both production and backup storage are compromised, the isolation zone will have a clean copy that can be used to quickly restore services. Setting the replication Service Level Agreement (SLA) will automatically replicate periodic data copies from the production or backup storage to the isolation environment. Since the replication link is active only during replication, the possibility of ransomware accessing data in the isolation zone is relatively low. For added security, the isolation zone storage also features multi-layer data protection, supporting anti-tamper features such as secure snapshots.

End-to-end encryption (data will not be leaked): Huawei storage ensures zero data leaks on the storage transmission network and storage through encryption of: protocol, production and backup storage, air-gap replication link, and remote replication transmission of data and backup copies. Even if hackers break the storage or intrude the storage network, they have no access to the confidential data thanks to the encryption deployment.

End-to-end encryption (data will not be leaked): Huawei storage uses end-to-end encryption technology to ensure no data leaks either on storage devices or on the storage transmission network. The encryption covers protocol, production and backup data, the air-gap replication link, and remote data replication. Even if hackers manage to enter a system, they will not crack confidential data.

Defending against ransomware

Huawei’s ransomware protection storage solution is working 24/7 around the world for large customers in energy, finance, transportation, manufacturing, and government.

Better safe than sorry. Installing ransomware protection after the fact is too late. A comprehensive ransomware protection storage solution is the best way to stop or mitigate ransomware.

For more information about how you can build powerful defense for your data, visit our website (https://bit.ly/3RRI74g).

Distributed by APO Group on behalf of Huawei Enterprise.

Business

Port Community Systems (PCS) as the crisis backbone: how trade disruption makes digital port infrastructure non-negotiable (By Alioune Ciss)

Published

on

Port Community Systems

With PCS, ports can dynamically allocate resources, adjust workflows, and reprioritize cargo flows using real-time data and coordinated processes

DUBAI, United Arab Emirates, May 19, 2026/APO Group/ —By Alioune Ciss, Chief Executive Officer, Webb Fontaine (https://WebbFontaine.com).

When global trade flows normally, Port Community Systems (PCS) are often viewed as efficiency tools. They digitize paperwork, connect stakeholders, reduce delays, and improve visibility across port ecosystems. However, the true impact and strategic importance of PCS become most apparent when a crisis hits.

Whether caused by geopolitical conflict, canal restrictions, rerouted shipping lanes, cyber risk, labor disruption, or sudden regulatory shifts, modern supply chain shocks remind us that ports without strong digital coordination struggle to adapt, whereas ports with robust PCS infrastructure are better positioned to keep cargo moving. In today’s environment, PCS has become a critical infrastructure.

Disruption is not an exception anymore

Global maritime trade has entered a more volatile era where disruption is structural. Let’s review the recent events to understand the scale of impact:

  • Around 2,000 ships were reportedly stranded during the recent Strait of Hormuz (https://apo-opa.co/4dii0lb) crisis.
  • The Red Sea crisis (https://apo-opa.co/4dz5gFA) led to more than 190 attacks on vessels by late 2024, forcing widespread rerouting and increasing transit times by up to two weeks.
  • The Suez-linked corridor (https://apo-opa.co/4dz5gFA), which carries roughly 10–12% of global maritime trade, experienced sharp volume declines during the disruption.
  • Supply chains across the Middle East, Africa, and Europe faced cascading effects, including congestion, cost increases, and schedule instability.

At the same time, the global port industry itself is undergoing rapid transformation. According to the International Association of Ports and Harbors (IAPH), ports are accelerating digitalization and strengthening resilience capabilities in response to geopolitical and operational uncertainty. This is the new reality: routes shift, volumes spike, and conditions change faster than traditional systems can handle.

Why PCS matters most during a crisis

When vessel schedules collapse, or cargo volumes suddenly spike, physical infrastructure alone is not enough. Cranes, berths, gates and yards also need coordination. That is where PCS becomes the backbone of resilience.

A PCS is not just a digital tool; rather, it’s a shared operational layer. It connects shipping lines, terminals, customs, freight forwarders, transport operators, and authorities through a single data environment, enabling synchronized decision-making across the ecosystem.

Instead of exchanges through emails, phone calls, Excel files, or siloed systems that generate delays and errors, the PCS enables seamless and real-time coordination.

1. Real-time visibility across the ecosystem

When vessels are delayed or rerouted, fragmented communication becomes a liability.

PCS enables real-time visibility across:

  • vessel arrivals and berth planning
  • cargo status and documentation
  • customs readiness and inspections
  • gate operations and inland logistics

Instead of fragmented updates, stakeholders operate from a shared, trusted data environment.

When shipping lanes shift overnight, policies change, and when uncertainty increases, the strongest ports are the ones that are the most ‘connected’

In a crisis, the speed of information becomes the speed of recovery.

2. Faster decision-making under pressure

Sudden disruptions create immediate operational stress:

  • surges in transshipment volumes
  • yard congestion risks
  • inspection bottlenecks
  • inland transport delays

Without digital coordination, responses are reactive and slow.

With PCS, ports can dynamically allocate resources, adjust workflows, and reprioritize cargo flows using real-time data and coordinated processes.

3. Customs and border continuity

Cargo cannot move if border agencies cannot move.

According to joint guidance from the World Customs Organization (WCO) and International Association of Ports and Harbors (IAPH), interoperability between Customs systems and PCS is essential for coordinated border management, risk control, and secure data exchange (https://apo-opa.co/3PLcs9P).

In crisis conditions, this becomes critical. Governments must introduce new controls, risk filters, or emergency procedures quickly, without disrupting trade flows. PCS enables this  balance.

4. Trust and transparency for the market

Importers, exporters, and carriers can tolerate disruption more than uncertainty. What they need is visibility.

PCS provides transparency across the supply chain, allowing stakeholders to track cargo status, anticipate delays, and plan accordingly. This transparency builds trust and reduces the systemic risk of panic-driven inefficiencies.

Operational resilience is the key

As we all know, the classic PCS discussions focus on key KPIs such as:

  • reduced turnaround time
  • fewer documents
  • lower administrative cost
  • faster truck processing

But today, the most important KPI is “readiness”: If a major trade corridor shifts tomorrow, can your port ecosystem adapt in real time?

To answer “Yes” to this question, a future-ready PCS should include:

  • real-time event management
  • integrated stakeholder communication
  • predictive congestion alerts
  • interoperability with customs and regulatory systems
  • scalable architecture for demand spikes

“For years, ‘efficiency’ was key when it comes to PCS. However, today, the key is ‘resilience’… When shipping lanes shift overnight, policies change, and when uncertainty increases, the strongest ports are the ones that are the most ‘connected’… Therefore, we should treat PCS as a crisis backbone of trade, not an IT efficiency initiative.
[Alioune Ciss, CEO, Webb Fontaine]

The Next Evolution: Intelligent PCS

PCS is now entering a new phase. Next-generation systems are evolving into data-driven platforms that support predictive analytics, AI-enabled decision-making, and proactive risk management (https://apo-opa.co/4eQ93Rg).

In other words, today, ports need systems that help orchestrate responses. Solutions such as Webb Ports (https://apo-opa.co/42F3gqq) from Webb Fontaine reflect this shift. By connecting all port stakeholders through a unified platform, anticipating congestion before it happens, simulating operational scenarios, and optimizing resource allocation dynamically, we enable faster coordination, better visibility and more agile responses when disruptions occur.

Distributed by APO Group on behalf of Webb Fontaine.

 

Continue Reading

Energy

Rand Refinery Joins African Mining Week (AMW) as Silver Sponsor Amid Regional Market Expansion Strategy

Published

on

Energy Capital

African Mining Week 2026 will showcase lucrative investment, partnership, and knowledge-exchange opportunities across Africa’s gold downstream sector, as Rand Refinery intensifies its investment and expansion strategy across the continent

CAPE TOWN, South Africa, May 19, 2026/APO Group/ –Amid a strategy to expand from a South Africa-focused refiner into a pan-African downstream leader, Rand Refinery has joined African Mining Week (AMW), an Influential African Mining Conference, scheduled for October 14-16, 2026 in Cape Town, as a silver sponsor.

Rand Refinery’s participation reflects a broader strategic alignment between the company’s expansion agenda and AMW’s focus on supporting and enabling local beneficiation and promoting artisanal and small-scale mining (ASM) responsible sourcing frameworks.

 

In terms of volumes, the latest market information indicates that Africa produces 1000tpa of mined gold (more than any other continent), with large-scale mining (LSM) and ASM being almost evenly balanced (500tpa production each). On its current trajectory, African ASM volumes are expected to eclipse those of LSM.

 

The focus on ASM as a transformational imperative is valid, and Rand Refinery is an active participant in the precious metals supply chain, working alongside other upstream and downstream actors to ensure that the communities and countries with gold resources benefit in a sustainable manner.

 

Under the theme Mining the Future: Unearthing Africa’s Full Mineral Value Chain, AMW 2026 offers a critical interface between refiners, miners, regulators, and financial institutions, as African countries intensify efforts to capture more value from responsible mineral production.

 

A key pillar of Rand Refinery’s 2026 strategy is its expansion into high-growth gold markets beyond South Africa. In January 2026, the company partnered with Ghana’s Gold Coast Refinery (GCR) to support the Ghana Gold Board to locally refine artisanal and small-scale (ASM) gold and elevate responsible sourcing standards in West Africa. The partnership also positions Rand Refinery in a rapidly growing and historically fragmented supply segment: ASM operations, enabling the company to enhance traceability and strengthen compliance with global standards for ethical sourcing and anti-money laundering.

 

The partnership potentially allows the monetization of ASM supply streams in the formal gold ecosystem, complementing Rand Refinery’s established role in refining output from responsible large-scale producers. AMW 2026 represents a timely platform for the company to provide an update on its projects and contribution to Africa’s gold sector.

 

As demand for regional refining capacity expands, along with central bank buying programs, companies such as Rand Refinery will be crucial.

 

Central bank gold purchases are projected to average around 585 tons per quarter in 2026, underscoring sustained global demand. In Africa, gold now accounts for approximately 17% of total reserves – up from less than 10% in 2022–2023 – while physical holdings increased from 663 tons in 2022 to an estimated 738 tons in 2025.

 

This upward trajectory is driving demand for trusted refining and value addition services, positioning Rand Refinery as a key partner in the region. Against this backdrop, AMW provides a strategic platform for central banks and gold buyers to engage directly with one of the world’s largest integrated single-site precious metals refining and smelting complexes and strengthen regional beneficiation and national reserve strategies.

 

At AMW, Rand Refinery executives will participate in panel discussions and networking sessions, engaging stakeholders on partnership opportunities that support a more integrated, transparent and value-driven African gold ecosystem.

Distributed by APO Group on behalf of Energy Capital & Power.

Continue Reading

Business

Applications open for the 2027 Meltwater Entrepreneurial School of Technology (MEST) Africa AI Startup Program

Published

on

Meltwater

Join a global community of AI entrepreneurs

ACCRA, Ghana, May 19, 2026/APO Group/ –The Meltwater Entrepreneurial School of Technology (MEST) (https://Meltwater.org), has opened applications for the second edition of the MEST AI Startup Program, a fully-funded, immersive experience designed to equip Africa’s most promising AI entrepreneurs with the technical, business, product, and leadership skills to build and scale globally competitive AI startups.

Over a seven-month training phase, the MEST AI Startup program will provide founders with hands-on instruction, technical mentorship, and business coaching from global experts to develop AI-powered solutions. The top startups will then advance to a four-month incubation period to refine products, sharpen go-to-market strategies, and secure market traction. At the end of incubation, startups have the opportunity to pitch for pre-seed investment of up to $100,000 and join the MEST Portfolio.

We are excited to support the next generation of African AI founders through training delivered by some of the most knowledgeable experts in the industry

The inaugural cohort brought together founders from seven African countries who are already building transformative AI solutions across industries. Building on the momentum of the first edition, the 2027 intake reflects MEST Africa’s continued commitment to ensuring African entrepreneurs play a defining role in the future of artificial intelligence.

According to Emily Fiagbedzi, AI Startup Program Director, the urgency of investing in African AI talent has never been greater.

“AI technology is advancing at an extraordinary pace, and meaningful participation in the global AI economy requires more than access to tools, it requires the ability to build,” she said. “This program is designed to help talented African founders develop solutions to real challenges while positioning them to compete globally. We are excited to support the next generation of African AI founders through training delivered by some of the most knowledgeable experts in the industry from organizations including OpenAI, Perplexity, Google, and Meltwater”

For the 2027 intake, the program is open to African founders based in Ghana, Nigeria, Senegal, and Kenya aged 21–35 with software development experience who want to start their own AI startup.

Apply now at https://apo-opa.co/3ReIQSI

Distributed by APO Group on behalf of The Meltwater Entrepreneurial School of Technology (MEST Africa).

 

Continue Reading

Trending