Chinese spies spent months inside aerospace engineering firm’s network via legacy IT

September 18, 2024 at 01:08PM Chinese state-sponsored spies breached a global engineering firm’s network using default credentials on an IBM AIX server. The espionage, attributed to a People’s Republic of China team, aimed for intellectual property theft and supply-chain manipulation. Despite exposure to local and federal agencies, the intruders established persistent access before getting caught, … Read more

A Necessary Digital Odyssey of RPA and AI/ML at HUD

March 12, 2024 at 11:32PM HUD used RPA and AI/ML to address operational challenges during US government shutdowns and legacy system rigidity. They automated housing contract monitoring with RPA, overcoming legacy system constraints, and utilized AI/ML to understand federal regulation impacts on procurement and HR, identifying and addressing bottlenecks in these processes. This digital transformation … Read more

A Necessary Digital Odyssey of RPA and AI/ML at HUD

March 12, 2024 at 11:32PM Summary: HUD encountered operational challenges during the US Government shutdown leading to the deployment of Robotic Process Automation (RPA) and Artificial Intelligence/Machine Learning (AI/ML). RPA was used to automate monitoring of housing contracts, addressing fragilities in HUD’s legacy systems. AI/ML and big data analysis were employed to understand federal regulation … Read more

British Library pushes the cloud button, says legacy IT estate cause of hefty rebuild

March 11, 2024 at 09:42AM The British Library is struggling to recover from the Rhysida ransomware attack due to legacy IT systems, highlighting the need for modernization and increased security measures. The attack caused significant disruption to library services and has emphasized the importance of cloud-based technologies. The institution is now planning a comprehensive IT … Read more