In this short video, Ravi Patil, Director, Product Management & Strategy, explains Mainframe cybersecurity in simple terms and recommends an effective approach for protecting your company. Learn More Here
In this short video, Ravi Patil, Director, Product Management & Strategy, explains Mainframe cybersecurity in simple terms and recommends an effective approach for protecting your company. Learn More Here
In August, Tracy Dean, Product Manager, IMS Tools and z/VM Tools, presented an insightful session on "What does IBM z Cyber Vault mean for an IMS environment?" In her presentation, she explored the significance of IBM Z Cyber Vault in safeguarding data integrity and...
The digital age has ushered in an era of unparalleled technological advancements, facilitating the rapid growth of global commerce, communication, and data sharing. While the ubiquity of digital interconnections has brought immense benefits, it also presents new...
Written by: Jose Arias, CISSP, ITILMainframe Security Specialist Imagine the surprise when, as an occasional gym visitor, you return to your fitness center one day, eager to resume your workouts, only to find that the familiar wristband is no longer the key to access....
The stages in a mainframe breach are familiar to most mainframers these days. Firstly, the bad actors need to gain access to the mainframe. That is as simple as going to the web and buying a user id and password combo for as little as $120. But even worse if the...
Cybersecurity is a journey. The last three decades show that hackers and security teams have continually competed with each other, adapting to a changing environment. Both have learned from each other, but cybersecurity has—perhaps inevitably—always had to catch up to...
We trust you've appreciated our September series, centered around Db2. Over the past few weeks, we've had the pleasure of sharing over 10 fresh, original Db2 articles with our dedicated audience. Today, we are thrilled to introduce an engaging new theme for...
“If you spend more on coffee than on IT security, you will be hacked.” That was according to Richard Clarke, former special advisor on cybersecurity to the US President. He added, “What’s more, you deserve to be hacked,” which does seem a little harsh. Maybe...
Implementing CICS Security with RACF can be a complex and demanding process. In order to do it to a level that creates a good balance can take time and requires good knowledge and understanding of both CICS and RACF. So I will explain the various steps in securing...
It seems like every week there is a new story of a major company or organization being affected by a cyber-attack. It might be a ransomware attack, stolen user data, or other disruption to services, and may be initiated either by an external attack or internal...