Featured
Cyber Security Month

From Poolside Code to Mainframe Maven – Influential Mainframer Felix Scott
Felix Scott, a trainee in the New to Z (NTZ) program at Vertali in the UK, doesn’t fit the usual mental picture of a mainframer. At 27, he’s a younger voice in a field dominated by veterans. But Felix isn’t afraid to admit what he doesn’t know. "Being publicly wrong...

Strengthening Enterprise Security with IBM Multi-Factor Authentication
Why MFA is Crucial in Today’s Security Landscape Traditionally, user authentication has relied heavily on passwords or passphrases. However, passwords alone have become a weak point in cybersecurity. They are often easy to guess, reused across systems, or written...

Share Your Thoughts — What Does a Global Blackout Mean for Mainframe Companies?
Calling Crowdstrike’s global technology outage “inconvenient” is the understatement of the year. From airlines to banking, 9-1-1 emergency services to grocery stores, and hospitals to telecommunications, millions are maddeningly stuck. The technology blackout began...

The Most Important Part for Cybersecurity
The relationship between education and security The digital age is a double-edged sword. While it offers unprecedented connectivity and innovation, it also presents a vast and ever-evolving landscape of cyber threats. From the devastating "mother of all breaches" in...

Cybersecurity in the Age of IoT: Safeguarding the Internet of Things
The emergence of the Internet of Things, or IoT, as it’s commonly known, has been a massive boon to just about every aspect of our society. It allows a multitude of physical objects in our everyday lives to connect us to the Internet. Popular products include home...

Total Network Failure on your Production System – What are the Chances?
Perhaps higher than you may think. Total loss of network connectivity is a critical event that can be hard to diagnose and recover from, especially if the systems specialists cannot connect to the system. The three mostly likely causes for total network failure on a...

Surveys, security and spaghetti
Mark Wilson reflects on the findings of a recent mainframe survey, explaining why security should be the number one priority, and why we need to start talking about complexity and observability. I read with interest the highlights of the Arcati Mainframe survey 2024,...

Vertali zTrust: Detect Network Activity and Control Traffic to Enhance Cybersecurity and Compliance
Vertali’s zTrust is a unique software solution that dramatically reduces the time, effort and costs needed to secure your operations and prove compliance with data standards and industry regulations. zTrust reveals network activity to and from your mainframe,...
Latest

Securing software products—protecting the supply chain
Earlier this year, I presented sessions at SHARE New Orleans on mainframe security, hacking, and security assessments. These spiked quite a bit of interest among attendees. In particular, a conversation kicked off with several leading mainframe-focused software...

Hybrid Cloud: The Key to Marrying Security & Modernization
As of 2023, over 72% of businesses worldwide have been affected by ransomware attacks. With new attacks seemingly every day and the cost of these attacks on the rise, companies know they can’t afford to joke around about security. Because of this, many are opting to...

How to Prevent Scary Cyberattacks with Mainframe Cyber Resiliency
Preventing ransomware attacks has become one of the top cybersecurity priorities for organizations. Mainframes are not immune to ransomware or any other cyberattack. Yes, the most secure platform on the planet that runs mission-critical applications and holds...

History of Cybercrime and Cybersecurity
For a long time, mainframes seemed like a safe room where a company’s most precious data possessions would be secure. But while mainframes still present unique challenges to bad actors, the days of mainframe impenetrability are most definitely over. Ever since the...

Who’s in charge? Controlling network traffic to enhance cyber security and compliance
With cyber security and cyber resiliency top priorities for organizations, is enough focus given to the wider network, asks Tony Amies of Vertali How can you confirm that your network access control settings are correct and are working as intended? How can you...

A CISO Profile
For those who have grown up with the internet, it’s probably hard to imagine a time when cyberattacks did not loom as an existential threat to organizations. But the role of Chief Information Security Officer (CISO) is a fairly recent invention, coming into...

Mainframe Cybersecurity: What Every Leader Needs to Know
In this short video, Ravi Patil, Director, Product Management & Strategy, explains Mainframe cybersecurity in simple terms and recommends an effective approach for protecting your company. Learn More Here

Enhancing Data Security and Recovery with IBM Z Cyber Vault
In August, Tracy Dean, Product Manager, IMS Tools and z/VM Tools, presented an insightful session on "What does IBM z Cyber Vault mean for an IMS environment?" In her presentation, she explored the significance of IBM Z Cyber Vault in safeguarding data integrity and...
Sign up to receive the latest mainframe information
Upcoming Events
IDUG EMEA 2025
Dusseldorf, GermanyIDUG will be taking place in Dusseldorf for the 2025 EMEA Db2 Tech Conference! Experience the custom Solution Center, workshops & hands-on labs, IBM’s certification & badging opportunities, as well […]

GSUK In-person Conference 25
The GSUK In-person Conference 25 is the leading independent Mainframe user event in the United Kingdom, bringing together hundreds of professionals, vendors, and thought leaders from across the enterprise IT landscape. Taking […]

Virtual IMS User Group | IMS Managed ACB Mandate After 6 Months – Adapting to the New Normal
Zoom - Virtual MeetingIMS Managed ACB Mandate After 6 Months – Adapting to the New Normal Six months after the IMS Managed ACB mandate, the landscape for IMS administrators and DBAs has fundamentally […]

Virtual CICS User Group | November 13, 2025
Zoom - Virtual MeetingRegistrations are available here!

Mainframe Firsts
Mainframes have a reputation for being rock-solid, reliable…and maybe a little mysterious (to outsiders at least). But behind the green screens and acronyms lies a rich history of innovation that has shaped the modern computing world. From groundbreaking hardware...

Announcements at SHARE, Job-Ready Talent training, and more
IBM and Arivonix Announce Deep watsonx.ai Integration at SHARE Cleveland YUPRO Placement and Franklin Skills Launch SKILLSFIT™ to Deliver Job-Ready IT Talent, Filling Urgent Gaps Hitachi Vantara Recognized by GigaOm for Innovation in Object Storage Royal Cyber Unveils...

A Decade in Purple Chucks: Celebrating Planet Mainframe
When a group of mainframers started a part-time mainframe blog 10 years ago, they never imagined it would become a leading website for mainframe industry news. For over a decade, we’ve shared ideas, explored new innovations, and highlighted the people shaping the...

Join Planet Mainframe at SHARE Cleveland for Trivia, Prizes, and More
Next week, SHARE is taking over Cleveland, Ohio, and we’re bringing the party to Booth #612! If you’re going to be there, here’s what we’ve got planned: Look for these friendly faces: Amanda Hendley, Mark Wilson, and Penney Berryman Celebrating the 2025 Influential...

Mainframes and Their Rivals
For decades, mainframes have stood quietly at the heart of global enterprise computing, but they haven’t been without competition. From the rise of minicomputers to the spread of UNIX systems and the open-source movement, each wave of innovation has challenged the...

Industry-Wide Security Event, Accelerate Mainframe Migrations, and more
IBM Announces z/OS 3.2 to Power AI-Driven, Secure Hybrid Cloud Workloads Vertali APAC brings MainTegrity® CSF to Australia Industry-Wide Security Event: Vanguard Security & Compliance 2025 Kyndryl Launches New AI-Powered Services to Accelerate Mainframe Migration...