Preparing for DORA: Is Your Enterprise Resilient?
April 15, 2024
Vertali’s Mark Wilson on DORA’s implications, the NIST Cybersecurity Framework and how to respond to cyber incidents
ArticlesThe Cost of a Data Breach Reaches an All-Time High of $4.45 Million
September 26, 2023
MGM Resorts was the latest victim of a social engineering hack that brought the casino chain to its knees. The breach happened last week when hackers obtained a password by posing as an employee of the Las Vegas resort chain. According to published reports on TechCrunch and Bloomberg, the attack crippled MGM’s hotel guest services […]
ArticlesPOSIX-tivity and IBM Z
August 17, 2023
“Standard,” according to en.wiktionary.org, can be used as a noun that means, “Something used as a measure for comparative evaluations; a model.” The history of standards is a deeply interwoven thread through the history of humanity. But the emergence of computing and IT over the past century has been a somewhat special yarn. On one […]
PodcastsThe Ongoing Challenge of Keeping Personal Data Private
August 22, 2022
Charlie Guarino: Hi everybody, this is Charlie Guarino. Welcome to another edition of TechTalk SMB. I’m very happy today to be sitting with the vice president of strategy, CTO and CISO, which is the chief information security officer, of Arcad Software, none other than Mr. Michel Mouchon. Michel, what a pleasure it is to be […]
ArticlesIBM z16 Accelerates AI, Simplifies Compliance, Safeguards Data and Avoids Outages
June 7, 2022
Following the IBM z16 GA on May 31, IBM’s Kelly Pushong highlights key IBM z16 benefits, community reactions and the importance of collaboration for this latest zSystems release
Kubernetes Container Security Best Practices With Red Hat Advanced Cluster Security for Kubernetes
August 30, 2021
As we work with organizations who are adopting containers as part of their software development strategy, we have seen container security become a challenge for many, and at times an aftersight. This is not on purpose, but primarily a result of the vast differences between the new technology of containers versus the virtualization model many […]
ArticlesStreamline Regulatory Compliance With a Hybrid Cloud
April 1, 2019
In today’s business climate, just delivering goods and services to customers is no longer enough. Amid an ongoing stream of security breaches, countries, regions and industries around the globe have established regulations governing data protection—data privacy and data security. As a result, enterprises need to demonstrate and maintain compliance around egulations such as the European […]
ArticlesCompliance Requires Layered Security
March 1, 2019
Businesses need to worry about more than just developing products and services for their customers. They need to deliver those products and services while complying with a plethora of standards and regulations governing how data can be collected, processed, stored and transferred. These standards range from highly specific documents covering niche markets like healthcare, to […]
ArticlesIBM Infrastructure Plays a Critical Role in Cloud, AI and Security
February 1, 2019
Cloud, artificial intelligence (AI) and security all have underpinnings in infrastructure—the servers, storage and software that power an organization. A purpose-built architecture is critical to achieving the performance needed for current and future business requirements. “Technology alone can’t transform a company, but it’s a very essential ingredient in business transformation,” says Tom Rosamilia, senior vice […]
ArticlesDevSecOps Matters for the Mainframe
January 1, 2019
Today’s customers want new services and they want them now. To remain competitive and keep up with customer needs, organizations are seeking ways to innovate rapidly around some of their most valuable assets—customer data and enterprise data. At one time, the mainframe was viewed as an isolated system. Data was often moved to a different […]