Featured
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Cyber Security Month

Defense against the dark arts — mainframe security
Mainframers who thought the mainframe was too difficult a platform to hack are few and far between these days. However, mainframes can be hacked, and they are being hacked.In terms of security, what spells, incantations, and practices should organizations employ to...

Advancing Mainframe Security with Ethical Mainframe Hacking
Written by: David Bruce Put on your hoodie and head for a darkened room! Oh. Wait. Sorry, that’s just the movie version. Despite the stereotype, hackers are real, and they’re dangerous! It’s now their full-time job and they are doing it well. In July, ransomware...

Best Practices for Closing the Mainframe Security Gap
You could argue – as some folks have – that mainframes are inherently more secure than commodity servers because there are fewer variables at play on mainframe systems, making them easier to secure in some ways. The fact that mainframes account for a relatively small...

Fix the roof when the sun is shining: Data Loss Prevention
It’s high time we acknowledged that mainframe data loss is far more than a security problem. It’s fundamentally a business problem. As the old saying goes, prevention is better than cure. This applies to data loss and cyber attacks as much as anything else in life. If...

Db2 for z/OS: SEPARATE_SECURITY and SECADM
In the Db2 for z/OS module called DSNZPARM (ZPARM, for short), which provides the configuration settings for a Db2 subsystem, there is a parameter named SEPARATE_SECURITY. This ZPARM was introduced with Db2 10, and its purpose is to enable a Db2 for z/OS-using...

Quantum Safe Cryptography Overview
Quantum Safe Cryptography The Problem – Current Cryptography is Vulnerable to Quantum Computing Cryptography experts believe that by 2030 quantum computers will be advanced enough to cut the strength of symmetric key algorithms (such as AES, 3DES and RC4) by half, and...

Hide your privates
My mac had turned into a bit of a mess. I had ssh private keys (that use Passphrases of course!) in a variety of places and I wasn’t very happy about it. I have several different servers that I connect to. There are a few GitHub systems, a Linux system, and of course...

Recover Quickly With Surgical Precision
Resiliency is an integral part of the IBM Z platform. The IBM Z Cyber Vault solution is a concept for addressing data corruption whether through malicious intent, human error or failure of hardware or software. It provides an air gapped backup of the operating...
Latest

Lost in translation? Why mainframers and non-mainframers need to communicate
In today’s connected world and with security high on the agenda, IT people across the enterprise have to understand each other. Mainframers need to be able to talk to non-mainframers with clarity, and vice-versa. Managers in the enterprise need to understand both...

Securing data in transit
One way of looking at mainframe data is that it is either at rest or in transit. Data at rest is data that is not actively moving from device to device or network to network such as data stored on DASD or tape or some other way. Sometimes, data at rest is thought to...

Pervasive encryption concerns
In today’s treacherous world of constant hacking threats and corresponding data breaches, IT security and breach prevention has become a top-line concern for everyone in large IT organizations. With over six million data records lost or stolen every day – that’s...

Multi-Factor Authentication
There was a time when mainframes were in a world of their own, separated from other computing platforms. A world where even the mainframe staff seldom mixed with the distributed people, and managers had no idea what the mainframe did or how it did it. People who...

Database security – You need to pay better attention to it
Almost 2 years ago, it was reported that over 10,000 MongoDB databases had been deleted by ransomware groups - and much of that was done in a week's time. Let that sink in for a minute - 10,000 databases in a week - it's mind boggling. Makes you think twice about your...

Why mainframe shops are procrastinating over multi-factor authentication
In my last article I outlined why, for a number of reasons, mainframe shops are growing increasingly aware of the importance of bolstering security on their ‘Big Iron’ box. Despite that, in this piece I want to discuss why some organizations are procrastinating over...

Who’s afraid of the Big Bad Wolf?
Or: We need to talk about mainframe hacking There’s an elephant in the room says Mark Wilson. It’s mainframe-sized, at serious risk of being hacked, and its name is Z. “The only thing we have to fear is fear itself.” That was US president Franklin D. Roosevelt at his...

Do I need real-time, continuous, mainframe security monitoring and auditing?
To be honest, mainframes are pretty secure, aren’t they? We’ve had RACF and other External Security Managers (ESMs) for years. On top of that, the new z14 gives us pervasive encryption. And there are any number of logs recording what’s going on on Z, and we can run...
Sign up to receive the latest mainframe information
Upcoming Events
IDUG EMEA 2025
Dusseldorf, GermanyIDUG will be taking place in Dusseldorf for the 2025 EMEA Db2 Tech Conference! Experience the custom Solution Center, workshops & hands-on labs, IBM’s certification & badging opportunities, as well […]

GSUK In-person Conference 25
The GSUK In-person Conference 25 is the leading independent Mainframe user event in the United Kingdom, bringing together hundreds of professionals, vendors, and thought leaders from across the enterprise IT landscape. Taking […]

Virtual IMS User Group | IMS Managed ACB Mandate After 6 Months – Adapting to the New Normal
Zoom - Virtual MeetingIMS Managed ACB Mandate After 6 Months – Adapting to the New Normal Six months after the IMS Managed ACB mandate, the landscape for IMS administrators and DBAs has fundamentally […]

Virtual CICS User Group | November 13, 2025
Zoom - Virtual MeetingRegistrations are available here!

Mainframes and Their Rivals
For decades, mainframes have stood quietly at the heart of global enterprise computing, but they haven’t been without competition. From the rise of minicomputers to the spread of UNIX systems and the open-source movement, each wave of innovation has challenged the...

Industry-Wide Security Event, Accelerate Mainframe Migrations, and more
IBM Announces z/OS 3.2 to Power AI-Driven, Secure Hybrid Cloud Workloads Vertali APAC brings MainTegrity® CSF to Australia Industry-Wide Security Event: Vanguard Security & Compliance 2025 Kyndryl Launches New AI-Powered Services to Accelerate Mainframe Migration...

Mainframes in Pop Culture
We’re in the long, hot days of summer here in the Northern Hemisphere, and while many of us may not be on summer holidays, our Planet Mainframe Trivia Quiz is going to venture into new territory - mainframes in pop culture! Mainframes may be known for their...

IBM Power11, SHARE Cleveland Technical Agenda, and more
IBM Introduces Power11: Purpose-Built Infrastructure for the AI Era A cornerstone of IBM’s AI strategy is building the infrastructure to support it. This month, IBM introduced IBM Power11, the latest generation of IBM Power® servers, built for the era of AI,...

CICS Month Trivia
It’s CICS month at Planet Mainframe! That means we’ll spend some time this month exploring the system that’s been the bedrock of enterprise transaction processing since the 1960s. CICS grew out of the idea of Ben Riggens, an IBM systems engineer working at Virginia...

Unify Agentic Governance and Security, 8th Annual AI Breakthrough, and more
BMC Recognized for Artificial Intelligence Innovation in 8th Annual AI Breakthrough Awards Program AI Breakthrough has named BMC the winner of its 2025 “Conversational AI Innovation Award,” recognizing the company’s BMC AMI Assistant for its innovative use of...