Db2 for z/OS: SEPARATE_SECURITY and SECADM

Db2 for z/OS: SEPARATE_SECURITY and SECADM

 In the Db2 for z/OS module called DSNZPARM (ZPARM, for short), which provides the configuration settings for a Db2 subsystem, there is a parameter named SEPARATE_SECURITY. This ZPARM was introduced with Db2 10, and its purpose is to enable a Db2 for z/OS-using...

read more
Quantum Safe Cryptography Overview

Quantum Safe Cryptography Overview

Quantum Safe Cryptography The Problem – Current Cryptography is Vulnerable to Quantum Computing Cryptography experts believe that by 2030 quantum computers will be advanced enough to cut the strength of symmetric key algorithms (such as AES, 3DES and RC4) by half, and...

read more
Hide your privates

Hide your privates

My mac had turned into a bit of a mess. I had ssh private keys (that use Passphrases of course!) in a variety of places and I wasn’t very happy about it. I have several different servers that I connect to. There are a few GitHub systems, a Linux system, and of course...

read more
Recover Quickly With Surgical Precision

Recover Quickly With Surgical Precision

Resiliency is an integral part of the IBM Z platform. The IBM Z Cyber Vault solution is a concept for addressing data corruption whether through malicious intent, human error or failure of hardware or software. It provides an air gapped backup of the operating...

read more
How to solve the Data Privacy issue for test data

How to solve the Data Privacy issue for test data

You may be aware of data privacy regulations such as Europe’s GDPR (General Data Protection Regulation) or California’s CCPA (California Consumer Privacy Act) that, among other things, ban you from using production data with personally identifiable information, such...

read more
CICS Security – ADCD and Dallas Z ISV RDP

CICS Security – ADCD and Dallas Z ISV RDP

In RACF security terminology, CICS is a resource manager. Resource manager security can be enabled or disabled. Dallas Z ISV RDP provided CICS security is disabled. Why? CICS manages many resources where enabling security requires decisions about which specific CICS...

read more