History of Cybercrime and Cybersecurity
For a long time, mainframes seemed like a safe room where a company’s most precious data possessions would be secure.…
Who’s in charge? Controlling network traffic to enhance cyber security and compliance
With cyber security and cyber resiliency top priorities for organizations, is enough focus given to the wider network, asks Tony…
Kyndryl Signs Agreement with UK Tax Authority and More
Kyndryl Signs Agreement with UK Tax Authority to Accelerate and De-risk Modernization in Critical Tax Infrastructure Kyndryl, IBM’s managed infrastructure…
How Can Continuous Monitoring Unleash the Hidden Power of Mainframes?
Written by: Jose Arias, CISSP, ITILMainframe Security Specialist, Broadcom Continuous monitoring of activities has become an integral part of our…
HAL 9000 isn’t coming for you–and other server predictions
The year is 2033. We’re in the future, and it looks a lot like today. There are no flying cars…
A CISO Profile
For those who have grown up with the internet, it’s probably hard to imagine a time when cyberattacks did not…
Mainframe Cybersecurity: What Every Leader Needs to Know
In this short video, Ravi Patil, Director, Product Management & Strategy, explains Mainframe cybersecurity in simple terms and recommends an…
Enhancing Data Security and Recovery with IBM Z Cyber Vault
In August, Tracy Dean, Product Manager, IMS Tools and z/VM Tools, presented an insightful session on “What does IBM z…