How Can Continuous Monitoring Unleash the Hidden Power of Mainframes?
Written by: Jose Arias, CISSP, ITILMainframe Security Specialist, Broadcom Continuous monitoring of activities has become an integral part of our…
HAL 9000 isn’t coming for you–and other server predictions
The year is 2033. We’re in the future, and it looks a lot like today. There are no flying cars…
A CISO Profile
For those who have grown up with the internet, it’s probably hard to imagine a time when cyberattacks did not…
Mainframe Cybersecurity: What Every Leader Needs to Know
In this short video, Ravi Patil, Director, Product Management & Strategy, explains Mainframe cybersecurity in simple terms and recommends an…
Enhancing Data Security and Recovery with IBM Z Cyber Vault
In August, Tracy Dean, Product Manager, IMS Tools and z/VM Tools, presented an insightful session on “What does IBM z…
Mainframe Security Trivia
For a long time, the perception that mainframes are inherently secure probably made life quite a bit easier for hackers…
The CISO’s Dilemma: Challenges in the Cyber Regulatory Environment
The digital age has ushered in an era of unparalleled technological advancements, facilitating the rapid growth of global commerce, communication,…
Make the Switch Now: Why Broadcom’s MFA is a Mainframe Must-Have
Written by: Jose Arias, CISSP, ITILMainframe Security Specialist Imagine the surprise when, as an occasional gym visitor, you return to…