Surveys, security and spaghetti

Surveys, security and spaghetti

Mark Wilson reflects on the findings of a recent mainframe survey, explaining why security should be the number one priority, and why we need to start talking about complexity and observability. I read with interest the highlights of the Arcati Mainframe survey 2024,...

read more
Db2 for z/OS: SEPARATE_SECURITY and SECADM

Db2 for z/OS: SEPARATE_SECURITY and SECADM

 In the Db2 for z/OS module called DSNZPARM (ZPARM, for short), which provides the configuration settings for a Db2 subsystem, there is a parameter named SEPARATE_SECURITY. This ZPARM was introduced with Db2 10, and its purpose is to enable a Db2 for z/OS-using...

read more
Quantum Safe Cryptography Overview

Quantum Safe Cryptography Overview

Quantum Safe Cryptography The Problem – Current Cryptography is Vulnerable to Quantum Computing Cryptography experts believe that by 2030 quantum computers will be advanced enough to cut the strength of symmetric key algorithms (such as AES, 3DES and RC4) by half, and...

read more
Hide your privates

Hide your privates

My mac had turned into a bit of a mess. I had ssh private keys (that use Passphrases of course!) in a variety of places and I wasn’t very happy about it. I have several different servers that I connect to. There are a few GitHub systems, a Linux system, and of course...

read more
Recover Quickly With Surgical Precision

Recover Quickly With Surgical Precision

Resiliency is an integral part of the IBM Z platform. The IBM Z Cyber Vault solution is a concept for addressing data corruption whether through malicious intent, human error or failure of hardware or software. It provides an air gapped backup of the operating...

read more
EP Strategies September Webinars