Securing CICS with RACF
Implementing CICS Security with RACF can be a complex and demanding process. In order to do it to a level…
Implementing CICS Security with RACF can be a complex and demanding process. In order to do it to a level…
It seems like every week there is a new story of a major company or organization being affected by a…
You could argue – as some folks have – that mainframes are inherently more secure than commodity servers because there…
It’s high time we acknowledged that mainframe data loss is far more than a security problem. It’s fundamentally a business…
In the Db2 for z/OS module called DSNZPARM (ZPARM, for short), which provides the configuration settings for a Db2 subsystem,…
Quantum Safe Cryptography The Problem – Current Cryptography is Vulnerable to Quantum Computing Cryptography experts believe that by 2030 quantum…
My mac had turned into a bit of a mess. I had ssh private keys (that use Passphrases of course!)…
Resiliency is an integral part of the IBM Z platform. The IBM Z Cyber Vault solution is a concept for addressing…