Latest Articles
The Underrated Elements of Cyber Resiliency
Written by: Ravi Patil How Cybersecurity is More than Protecting Against Bad Actors and Why It Matters Resiliency in a business context is often closely associated with continuity. If something happens, or if there is an outage, businesses depend on the principles of...
Securing software products—protecting the supply chain
Earlier this year, I presented sessions at SHARE New Orleans on mainframe security, hacking, and security assessments. These spiked quite a bit of interest among attendees. In particular, a conversation kicked off with several leading mainframe-focused software...
Hybrid Cloud: The Key to Marrying Security & Modernization
As of 2023, over 72% of businesses worldwide have been affected by ransomware attacks. With new attacks seemingly every day and the cost of these attacks on the rise, companies know they can’t afford to joke around about security. Because of this, many are opting to...
How to Prevent Scary Cyberattacks with Mainframe Cyber Resiliency
Preventing ransomware attacks has become one of the top cybersecurity priorities for organizations. Mainframes are not immune to ransomware or any other cyberattack. Yes, the most secure platform on the planet that runs mission-critical applications and holds...
History of Cybercrime and Cybersecurity
For a long time, mainframes seemed like a safe room where a company’s most precious data possessions would be secure. But while mainframes still present unique challenges to bad actors, the days of mainframe impenetrability are most definitely over. Ever since the...
Who’s in charge? Controlling network traffic to enhance cyber security and compliance
With cyber security and cyber resiliency top priorities for organizations, is enough focus given to the wider network, asks Tony Amies of Vertali How can you confirm that your network access control settings are correct and are working as intended? How can you...
Kyndryl Signs Agreement with UK Tax Authority and More
Kyndryl Signs Agreement with UK Tax Authority to Accelerate and De-risk Modernization in Critical Tax Infrastructure Kyndryl, IBM’s managed infrastructure services business spin-off, has signed an agreement to manage a proportion of HMRC’s (His Majesty’s Revenue and...
How Can Continuous Monitoring Unleash the Hidden Power of Mainframes?
Written by: Jose Arias, CISSP, ITILMainframe Security Specialist, Broadcom Continuous monitoring of activities has become an integral part of our daily lives, making it easier to track and manage various aspects, from our health to environmental concerns. ...
HAL 9000 isn’t coming for you–and other server predictions
The year is 2033. We’re in the future, and it looks a lot like today. There are no flying cars or immortality pills. Behind the scenes, technology continues running, with the amount of data generated growing year-over-year. Here are a few predictions for what...
A CISO Profile
For those who have grown up with the internet, it’s probably hard to imagine a time when cyberattacks did not loom as an existential threat to organizations. But the role of Chief Information Security Officer (CISO) is a fairly recent invention, coming into...



