Recent Articles
PowerTerm End-of-Life: Why Organizations Must Act Now – And Why the December 10 Webinar Is Critical
In March 2025, Ericom PowerTerm, a terminal emulator still used by thousands of organizations to access mainframes, IBM i systems, Unix hosts, VMS machines, and other mission-critical environments, officially entered End-of-Life (EOL). For decades, PowerTerm provided...
📰 Top 100 Most Loved Workplace, Workload Automation in Industry Report, and more
Kyndryl Cloud Readiness Report: Hybrid Cloud Shapes the Future of AI and Enterprise Agility BMC Selected as Overall Leader for Workload Automation in Industry Report Kyndryl Named a Top 100 Most Loved Workplace® by the Wall Street Journal IBM and Groq Partner to...
The Paradox of Mainframe Security: Most Secure Yet Still Vulnerable
The most secure system in the world is also vulnerable. Mainframes remain the backbone of critical infrastructure—but they are not immune to modern threats. Some still see mainframes as unbreakable fortresses, while others view them as legacy systems lagging in modern...
Future-Proof Your Mainframe: Highlights from Vanguard 2025 and Enhancing Security with ACF2 TM and Top Secret®
At the recent Vanguard Security & Compliance 2025 event (VSC 2025), security leaders came together to address today’s toughest mainframe security challenges, ranging from credential theft to Zero Trust adoption. As a Platinum Sponsor, Broadcom highlighted how...
The Hidden Cybersecurity Battle Inside the Mainframe 🎧
Mainframes remain the backbone of enterprise IT—but as cyber threats evolve, so must the defenses. In this podcast, Ken Chism, Head of Worldwide Cybersecurity Sales at BMC Software, shares an inside look at the changing landscape of mainframe security. Ken discusses...
NEWS – Commercial Availability of Spyre Accelerator, Kyndryl Survey 2025, & more
IBM Introduces the Spyre Accelerator for Commercial Availability Kyndryl Survey 2025: Mainframe Modernization Projects Deliver 2-3X ROI BMC 2025 Mainframe Survey: Confidence, Generational Shift in Views on Mainframe Development Rocket Software Advances COBOL...
Mainframe Penetration Testing: Why It Matters More Than Ever
The goal is not disruption but discovery. For decades, mainframes have been at the heart of critical industries such as finance, healthcare, government, and retail. Since IBM introduced the System/360 in 1964, these systems have earned a reputation for being reliable,...
The Top Four Infrastructure Capabilities for Enterprise Security and Compliance
Rising Stakes of Data Protection As our modern world becomes increasingly digital, data’s value has never been higher—and the challenge of protecting it has never been so great. While the global average cost of a data breach dipped 9% in the past year due to advances...
Latest
Enhancing Data Security and Recovery with IBM Z Cyber Vault
In August, Tracy Dean, Product Manager, IMS Tools and z/VM Tools, presented an insightful session on "What does IBM z Cyber Vault mean for an IMS environment?" In her presentation, she explored the significance of IBM Z Cyber Vault in safeguarding data integrity and...
The CISO’s Dilemma: Challenges in the Cyber Regulatory Environment
The digital age has ushered in an era of unparalleled technological advancements, facilitating the rapid growth of global commerce, communication, and data sharing. While the ubiquity of digital interconnections has brought immense benefits, it also presents new...
Make the Switch Now: Why Broadcom’s MFA is a Mainframe Must-Have
Written by: Jose Arias, CISSP, ITILMainframe Security Specialist Imagine the surprise when, as an occasional gym visitor, you return to your fitness center one day, eager to resume your workouts, only to find that the familiar wristband is no longer the key to access....
Mainframe security—Early Warning needed to beat back hackers
The stages in a mainframe breach are familiar to most mainframers these days. Firstly, the bad actors need to gain access to the mainframe. That is as simple as going to the web and buying a user id and password combo for as little as $120. But even worse if the...
The Evolution of Cybersecurity. From Cascade to Quantum
Cybersecurity is a journey. The last three decades show that hackers and security teams have continually competed with each other, adapting to a changing environment. Both have learned from each other, but cybersecurity has—perhaps inevitably—always had to catch up to...
Introducing Cyber Security Month
We trust you've appreciated our September series, centered around Db2. Over the past few weeks, we've had the pleasure of sharing over 10 fresh, original Db2 articles with our dedicated audience. Today, we are thrilled to introduce an engaging new theme for...
Make Security Your Competitive Advantage
“If you spend more on coffee than on IT security, you will be hacked.” That was according to Richard Clarke, former special advisor on cybersecurity to the US President. He added, “What’s more, you deserve to be hacked,” which does seem a little harsh. Maybe...
Securing CICS with RACF
Implementing CICS Security with RACF can be a complex and demanding process. In order to do it to a level that creates a good balance can take time and requires good knowledge and understanding of both CICS and RACF. So I will explain the various steps in securing...
Sign up to receive the latest mainframe information
Upcoming Events
-
-
Virtual CICS User Group | The IT Stairway to Heaven. CICS Testing Pyramid: From Unit to Integration to Production-Like Environment
Zoom - Virtual MeetingEffective testing is essential for building robust systems. Dive deep into a structured approach to the testing pyramid for CICS applications. Using Test4z, we will demonstrate how unit tests form […]
-
Virtual Db2 User Group | January 20, 2026
Zoom - Virtual Meeting -
-
Virtual IMS User Group | February 10, 2026
Zoom - Virtual Meeting -
-
Virtual CICS User Group | March 17, 2026
Zoom - Virtual Meeting
Mainframe Artificial Intelligence Quiz
At Planet Mainframe, we’re spending the month of November focusing on AI and the mainframe. Once viewed as separate worlds, AI and IBM Z now work hand in hand to deliver real-time insights, predictive analytics, and intelligent automation across enterprise-scale...
NEWS – Granite 4.0, Free Cybersecurity Labs, and more
IBM Announces Granite 4.0 Free (Cybersecurity) Labs! Upcoming IBM Z Day Chase Card Decommissioning All Mainframe Code, with AI Assistance IBM z/OS Core Collection v1.15.0 GA ReleasedIBM Announces Granite 4.0 IBM has introduced Granite 4.0, initiating a new era for its...
TRIVIA – Penetration Testing
Mainframes have long been known for their unmatched reliability and security—but even the most trusted systems can hide surprises beneath the surface. As technology evolves, so do the tactics of those trying to exploit it. Penetration testing (pen testing), or...
NEWS – Expanded AI-Powered Data Quality, Strategic Partnerships, & more
IBM and Groq Partner to Deliver Faster Agentic AI Capabilities Precisely Expands Access to AI-Powered Data Quality with Natural Language Interfaces in the Data Integrity Suite IBM Announces Advancements to Help Enterprises Operationalize AI Mainframe Technology...
TRIVIA – Cybersecurity Month
For many of us, October is about falling leaves, shorter days, and cooler weather. It also happens to be Cybersecurity month, the time when we dial in on the never-ending (and ever-evolving) task of securing the mainframe. Mainframes have a reputation for being...
NEWS – Commercial Availability of Spyre Accelerator, Kyndryl Survey 2025, & more
IBM Introduces the Spyre Accelerator for Commercial Availability Kyndryl Survey 2025: Mainframe Modernization Projects Deliver 2-3X ROI BMC 2025 Mainframe Survey: Confidence, Generational Shift in Views on Mainframe Development Rocket Software Advances COBOL...



