What was the cost of a data breach in 2020?
A data breach is every company’s waking nightmare. What is the cost of a data breach for your company? Ponemon…
More On IMS Usage
Understanding how an Input Message sent by an IMS Connect Client to IMS Connect works when OTMA NAKs the Input…
The new IBM Enterprise COBOL for z/OS Migration Assistant is live to guide you through COBOL migration
The IBM Enterprise COBOL for z/OS Migration Assistant (CMA) has been very popular among COBOL migration users. It is a…
Cyber security and cyber resiliency for financial institutions (and everyone else)
For everyone with a mainframe, cyber security and cyber resiliency are important. For financial institutions, a major breach could, potentially,…
How AI Applications Are Triggering A Renaissance in Legacy Mainframe Data
Everyone is familiar with the promise of AI and machine learning. Like a human, these intelligent systems are supposed to…
Basics of VSAM
This article will take you inside VSAM and explain the environment of Virtual Storage Access Method. VSAM has been around…
Strengthening your network cryptographic posture with zERT
Network security is not a new topic for IT practitioners, but always a hot one. Data breaches can be devastating…
Ill winds: Why Mainframe Security Should be Heading Your 2021 Priorities List
It’s an ill wind that blows no good, and profits nobody. That old nautical phrase popped into my head when…