Pervasive encryption concerns

Pervasive encryption concerns

In today’s treacherous world of constant hacking threats and corresponding data breaches, IT security and breach prevention has become a top-line concern for everyone in large IT organizations. With over six million data records lost or stolen every day – that’s...
Multi-Factor Authentication

Multi-Factor Authentication

There was a time when mainframes were in a world of their own, separated from other computing platforms. A world where even the mainframe staff seldom mixed with the distributed people, and managers had no idea what the mainframe did or how it did it. People who...
A view from the C-level

A view from the C-level

New mainframe technologies that will make a difference to your business Be honest: what do you really think of IT?  Most C-level execs think of it, at best, as a cost center to be minimized. Others go even further, thinking it arrogant, pushy, dictatorial, and...
Mainframe Upgrades – They Happen

Mainframe Upgrades – They Happen

System upgrades are a fact of life. If you’re running a mainframe system, you’re doing it for a good reason—and that’s almost certainly because you need the performance, capacity, throughput and security. Not only that, you’re more than likely...
Who’s afraid of the Big Bad Wolf?

Who’s afraid of the Big Bad Wolf?

Or: We need to talk about mainframe hacking There’s an elephant in the room says Mark Wilson. It’s mainframe-sized, at serious risk of being hacked, and its name is Z. “The only thing we have to fear is fear itself.” That was US president Franklin D. Roosevelt at his...
Mainframe news out there

Mainframe news out there

Once a month we like to pick blog articles from other sources that we feel are interesting enough to talk about on the Planet Mainframe blog. Here are this month’s picks: Monitoring the Cryptographic Protection of Your z/OS Network Traffic Here is a really interesting...
9 ways to Master the Z

9 ways to Master the Z

So you are now working on the mainframe platform. You wanted to keep up with the latest and greatest or you just wanted to get to know a topic or feature associated with the mainframe. Either you just started your job in a mainframe shop or you are an experienced...
Mainframes and the Cloud: Made for Each Other

Mainframes and the Cloud: Made for Each Other

April 2018 marked the 54th anniversary of IBM’s mainframes. It is uncertain if anyone could have ever predicted such a long and successful life for them. A quick historical sketch: IBM launched the first modern mainframe, IBM 360, on April 7, 1964. With 229,000...
I welcome our new machine overlords

I welcome our new machine overlords

It’s been a while since my last overly alarmist IT security rant, and with the holiday season just past—when millions of IoT devices flooded our homes and offices—I figure what better time to scare the crap out of the general public. But, in this instance, it’s not...
Monitoring your service providers

Monitoring your service providers

Outsourcing has been the rage for years now, and the outsourcing of computing resources to the cloud leads the way. And why not? It allows you to increase efficiency (focus on core business activities instead of running a datacenter), cut costs (you don’t have...
Mainframe mobile challenges and solutions

Mainframe mobile challenges and solutions

The need for modern mobile solutions for mainframe data centers Today most CIOs, CTOs and IT experts are aware of the impact of digital transformation (DX) on their respective businesses and IT organizations. Disruptive technologies like Big Data, business analytics,...
Validating your files

Validating your files

Mainframe files/datasets are liable to change quite often. After all, people are using those files so they are likely to be modified/updated. So how could you tell whether there had been a legitimate change to the file or it had been hacked? How can you verify that...