How to Survive a ‘Missile Attack’ and the Other Latest Cyberthreats
January 9, 2026
Robi Singh, mainframe architect at Vertali, offers advice for recovering in time and staying in business, including descriptions of the latest attack methods and how they can be defeated by resilient architecture
ArticlesMcNelly: IBM Unveils watsonx.data
January 5, 2026
Rob McNelly shares details on the recently GA'ed watsonx.data on IBM Power, an explainer on the dangers of 'shadow AI' and the latest security alerts
ArticlesExplaining Mainframe Security to Your CISO
December 4, 2025
Mark Wilson of Vertali explains how to help your CISO understand the threats that face the mainframe despite its reputation for security
VideoProtecting Your IBM Power Environment: Expert Insights on Cybersecurity and Malware Defense
November 20, 2025
Fortra’s Sandi Moore, Mike Davison and Tom Huntington address the latest threats and solutions
Sponsored Content by
Fortra
ASPG Announces Release of MegaCryption PC V2.3
November 18, 2025
The latest release delivers a significant upgrade to MegaCryption-PC’s security, flexibility and performance
Mainframe Security: The Future Is Here
November 17, 2025
Articles
AI Agents for IBM i: A Comprehensive Introduction
November 13, 2025
In this installment of IBM's "AI With IBM i" series, IBM AI specialists Adam Shedivy and Devansh Kumar explain how LLMs can be enhanced with knowledge, tools and memory to take real actions
ArticlesWhy Mainframe Security Postures Vary So Widely
November 5, 2025
Phil Young, director of mainframe penetration testing at NetSPI, describes the most commonly omitted security controls, and why they get skipped
Press ReleasesResearch Finds Majority of C-Suite Leaders Prioritize IT Modernization, but ROI Falls Short Without Comprehensive Strategy
September 10, 2025
Articles
SERVAUTH Class Security Features: Protecting Your Mainframe
September 9, 2025
Tony Amies, software technical director at Vertali, explains how the ESM (RACF|ACF|TSS) SERVAUTH class can be an invaluable—but often overlooked—tool for organizations pursuing a zero trust strategy