Part 2: My experience with IBM MFA on z/OS
After publishing “Strengthening Enterprise Security with IBM Multi-Factor Authentication,” I’m excited to share part two: my hands-on experience implementing and…
After publishing “Strengthening Enterprise Security with IBM Multi-Factor Authentication,” I’m excited to share part two: my hands-on experience implementing and…
There was a time when mainframes were in a world of their own, separated from other computing platforms. A world…
Retinal scans. Face recognition. Fingerprint scanners. Spoken phrases. Randomized pins. Those cool full-body laser scanners from the movies. Science fiction…