Featured
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Cyber Security Month

The “Experience Required” Paradox: Companies Can’t Fill Roles, Workers Shut Out
This article originally appeared in Forbes on February 5, 2025. Reposted with permission. Breaking into a cybersecurity career has never been easy and today it’s more competitive than ever. At the same time, there is a well-documented cybersecurity talent shortage,...

The good, the bad and the ugly: generative AI and cybersecurity
Putting the AI into mAInframe security Artificial intelligence can be as much a help as a threat: a powerful tool in the hands of either the good, the bad or the ugly. Today’s threat landscape and cybersecurity requirements are more complex and challenging than ever....

Who’s in charge? Controlling network traffic to enhance cyber security and compliance
With cyber security and cyber resiliency top priorities for organizations, is enough focus given to the wider network, asks Tony Amies of Vertali How can you confirm that your network access control settings are correct and are working as intended? How can you...

A CISO Profile
For those who have grown up with the internet, it’s probably hard to imagine a time when cyberattacks did not loom as an existential threat to organizations. But the role of Chief Information Security Officer (CISO) is a fairly recent invention, coming into...

Mainframe Cybersecurity: What Every Leader Needs to Know
In this short video, Ravi Patil, Director, Product Management & Strategy, explains Mainframe cybersecurity in simple terms and recommends an effective approach for protecting your company. Learn More Here

Enhancing Data Security and Recovery with IBM Z Cyber Vault
In August, Tracy Dean, Product Manager, IMS Tools and z/VM Tools, presented an insightful session on "What does IBM z Cyber Vault mean for an IMS environment?" In her presentation, she explored the significance of IBM Z Cyber Vault in safeguarding data integrity and...

The CISO’s Dilemma: Challenges in the Cyber Regulatory Environment
The digital age has ushered in an era of unparalleled technological advancements, facilitating the rapid growth of global commerce, communication, and data sharing. While the ubiquity of digital interconnections has brought immense benefits, it also presents new...

Make the Switch Now: Why Broadcom’s MFA is a Mainframe Must-Have
Written by: Jose Arias, CISSP, ITILMainframe Security Specialist Imagine the surprise when, as an occasional gym visitor, you return to your fitness center one day, eager to resume your workouts, only to find that the familiar wristband is no longer the key to access....
Latest

Best Practices for Closing the Mainframe Security Gap
You could argue – as some folks have – that mainframes are inherently more secure than commodity servers because there are fewer variables at play on mainframe systems, making them easier to secure in some ways. The fact that mainframes account for a relatively small...

Fix the roof when the sun is shining: Data Loss Prevention
It’s high time we acknowledged that mainframe data loss is far more than a security problem. It’s fundamentally a business problem. As the old saying goes, prevention is better than cure. This applies to data loss and cyber attacks as much as anything else in life. If...

Db2 for z/OS: SEPARATE_SECURITY and SECADM
In the Db2 for z/OS module called DSNZPARM (ZPARM, for short), which provides the configuration settings for a Db2 subsystem, there is a parameter named SEPARATE_SECURITY. This ZPARM was introduced with Db2 10, and its purpose is to enable a Db2 for z/OS-using...

Quantum Safe Cryptography Overview
Quantum Safe Cryptography The Problem – Current Cryptography is Vulnerable to Quantum Computing Cryptography experts believe that by 2030 quantum computers will be advanced enough to cut the strength of symmetric key algorithms (such as AES, 3DES and RC4) by half, and...

Hide your privates
My mac had turned into a bit of a mess. I had ssh private keys (that use Passphrases of course!) in a variety of places and I wasn’t very happy about it. I have several different servers that I connect to. There are a few GitHub systems, a Linux system, and of course...

Recover Quickly With Surgical Precision
Resiliency is an integral part of the IBM Z platform. The IBM Z Cyber Vault solution is a concept for addressing data corruption whether through malicious intent, human error or failure of hardware or software. It provides an air gapped backup of the operating...

How to solve the Data Privacy issue for test data
You may be aware of data privacy regulations such as Europe’s GDPR (General Data Protection Regulation) or California’s CCPA (California Consumer Privacy Act) that, among other things, ban you from using production data with personally identifiable information, such...

Four Essential Features for a Database Security Strategy to Take on a Growing Threat Landscape
For a considerable time, many organizations have used three to five on-premise databases to manage their workloads, and many teams have tried to funnel every application into using those databases. Today, as the pressure to innovate while keeping costs low...
Sign up to receive the latest mainframe information
Upcoming Events
IDUG EMEA 2025
Dusseldorf, GermanyIDUG will be taking place in Dusseldorf for the 2025 EMEA Db2 Tech Conference! Experience the custom Solution Center, workshops & hands-on labs, IBM’s certification & badging opportunities, as well […]

GSUK In-person Conference 25
The GSUK In-person Conference 25 is the leading independent Mainframe user event in the United Kingdom, bringing together hundreds of professionals, vendors, and thought leaders from across the enterprise IT landscape. Taking […]

Virtual IMS User Group | IMS Managed ACB Mandate After 6 Months – Adapting to the New Normal
Zoom - Virtual MeetingIMS Managed ACB Mandate After 6 Months – Adapting to the New Normal Six months after the IMS Managed ACB mandate, the landscape for IMS administrators and DBAs has fundamentally […]

Virtual CICS User Group | November 13, 2025
Zoom - Virtual MeetingRegistrations are available here!

A Decade in Purple Chucks: Celebrating Planet Mainframe
When a group of mainframers started a part-time mainframe blog 10 years ago, they never imagined it would become a leading website for mainframe industry news. For over a decade, we’ve shared ideas, explored new innovations, and highlighted the people shaping the...

Join Planet Mainframe at SHARE Cleveland for Trivia, Prizes, and More
Next week, SHARE is taking over Cleveland, Ohio, and we’re bringing the party to Booth #612! If you’re going to be there, here’s what we’ve got planned: Look for these friendly faces: Amanda Hendley, Mark Wilson, and Penney Berryman Celebrating the 2025 Influential...

Mainframes and Their Rivals
For decades, mainframes have stood quietly at the heart of global enterprise computing, but they haven’t been without competition. From the rise of minicomputers to the spread of UNIX systems and the open-source movement, each wave of innovation has challenged the...

Industry-Wide Security Event, Accelerate Mainframe Migrations, and more
IBM Announces z/OS 3.2 to Power AI-Driven, Secure Hybrid Cloud Workloads Vertali APAC brings MainTegrity® CSF to Australia Industry-Wide Security Event: Vanguard Security & Compliance 2025 Kyndryl Launches New AI-Powered Services to Accelerate Mainframe Migration...

Mainframes in Pop Culture
We’re in the long, hot days of summer here in the Northern Hemisphere, and while many of us may not be on summer holidays, our Planet Mainframe Trivia Quiz is going to venture into new territory - mainframes in pop culture! Mainframes may be known for their...

IBM Power11, SHARE Cleveland Technical Agenda, and more
IBM Introduces Power11: Purpose-Built Infrastructure for the AI Era A cornerstone of IBM’s AI strategy is building the infrastructure to support it. This month, IBM introduced IBM Power11, the latest generation of IBM Power® servers, built for the era of AI,...