Latest Articles
Mainframe Cybersecurity: What Every Leader Needs to Know
In this short video, Ravi Patil, Director, Product Management & Strategy, explains Mainframe cybersecurity in simple terms and recommends an effective approach for protecting your company. Learn More Here
Enhancing Data Security and Recovery with IBM Z Cyber Vault
In August, Tracy Dean, Product Manager, IMS Tools and z/VM Tools, presented an insightful session on "What does IBM z Cyber Vault mean for an IMS environment?" In her presentation, she explored the significance of IBM Z Cyber Vault in safeguarding data integrity and...
Mainframe Security Trivia
For a long time, the perception that mainframes are inherently secure probably made life quite a bit easier for hackers than it really needed to be. Back in the pre-internet world, corporations could probably afford to treat mainframe security as an...
The CISO’s Dilemma: Challenges in the Cyber Regulatory Environment
The digital age has ushered in an era of unparalleled technological advancements, facilitating the rapid growth of global commerce, communication, and data sharing. While the ubiquity of digital interconnections has brought immense benefits, it also presents new...
Make the Switch Now: Why Broadcom’s MFA is a Mainframe Must-Have
Written by: Jose Arias, CISSP, ITILMainframe Security Specialist Imagine the surprise when, as an occasional gym visitor, you return to your fitness center one day, eager to resume your workouts, only to find that the familiar wristband is no longer the key to access....
Mainframe security—Early Warning needed to beat back hackers
The stages in a mainframe breach are familiar to most mainframers these days. Firstly, the bad actors need to gain access to the mainframe. That is as simple as going to the web and buying a user id and password combo for as little as $120. But even worse if the...
The Evolution of Cybersecurity. From Cascade to Quantum
Cybersecurity is a journey. The last three decades show that hackers and security teams have continually competed with each other, adapting to a changing environment. Both have learned from each other, but cybersecurity has—perhaps inevitably—always had to catch up to...
Vertali expands operations into Asia-Pacific: Vertali APAC launches in Australia
UK, 28th September 2023 — Vertali, the fast-growing global provider of mainframe services, software and skills has announced further expansion into Asia-Pacific through a joint venture with The Business Agility Group (Australia) Pty Ltd – to be renamed...
SC Media Honors Rocket Software’s Cynthia Overby for Career in Mainframe Security and more
SC Media Honors Rocket Software’s Cynthia Overby for Career in Mainframe Security SC Media, a publication of the CyberRisk Alliance, has announced its five 2023 Women in IT Security Honorees. Among the five honorees is Rocket Software’s Cynthia Overby, lauded for her...
Using ISPF Edit Labels for Fun and Enhanced Productivity
Quoting from the IBM z/OS ISPF Edit and Edit Macros (SC19-3621-50): A label is an alphabetic character string used to name lines or strings of data for easy reference. Because labels remain with the lines to which they are assigned, they are especially useful in...



