The Hidden Risk in Your z/OS Environment

The Hidden Risk in Your z/OS Environment

In today’s always-on environments, changes to z/OS systems are happening constantly—often dynamically, and often under time pressure. While most organizations have formal change management processes in place, these processes are frequently reactive rather than...

read more
The Need for Effective Change Management

The Need for Effective Change Management

Introduction Over the last few years there has been an ever-increasing number of widely publicised problems involving notable corporate organisations and the failings of their IT systems.  Incidents of ransomware, hacking and phishing are becoming worryingly...

read more
From Master the Mainframe to Continuous Learning

From Master the Mainframe to Continuous Learning

The Virtual Mainframe User Group on IMS recently gathered to talk about Z Xplore. IBM Z XPlore is the successor to Master the Mainframe, the competition-style program that introduced thousands of students to IBM Z. Where Master the Mainframe ran only a few months each...

read more
Part 2: My experience with IBM MFA on z/OS

Part 2: My experience with IBM MFA on z/OS

After publishing “Strengthening Enterprise Security with IBM Multi-Factor Authentication,” I’m excited to share part two: my hands-on experience implementing and using multi-factor authentication (MFA) on z/OS. Before discussing the practical aspects, it’s important...

read more