Best Practices for Closing the Mainframe Security Gap
You could argue – as some folks have – that mainframes are inherently more secure than commodity servers because there…
You could argue – as some folks have – that mainframes are inherently more secure than commodity servers because there…
In the Db2 for z/OS module called DSNZPARM (ZPARM, for short), which provides the configuration settings for a Db2 subsystem,…
Quantum Safe Cryptography The Problem – Current Cryptography is Vulnerable to Quantum Computing Cryptography experts believe that by 2030 quantum…
My mac had turned into a bit of a mess. I had ssh private keys (that use Passphrases of course!)…
Resiliency is an integral part of the IBM Z platform. The IBM Z Cyber Vault solution is a concept for…
You may be aware of data privacy regulations such as Europe’s GDPR (General Data Protection Regulation) or California’s CCPA (California…
For a considerable time, many organizations have used three to five on-premise databases to manage their workloads, and many teams…
In RACF security terminology, CICS is a resource manager. Resource manager security can be enabled or disabled. Dallas Z ISV…