Kellermann analyzes the patterns of malware from the two geographies and concludes East European hackers lean towards custom-built, highly complex malware; East Asian hackers use more off-the-shelf malware and simpler techniques.
It’s an insightful argument and the original paper should be read by IT security staff. However, the bottom line is no matter where malware comes from, be prepared.
Understanding how IBM Spectrum Protect enables hybrid data protection
Abdicating your company’s data protection responsibilities to the first cloud solution provider you encounter is just as unwise as doing nothing at all to leverage the cloud. On the other hand, it can be a wise decision to investigate what results you might achieve by choosing a backup technology that is capable of supporting a hybrid protection approach capable of covering both on-premises technology and offsite cloud capabilities.