EU Cybersecurity Regulations Impact Businesses Worldwide
June 28, 2024
Now is the time to review your business plan and goals to stay in compliance, says 21CS’s Rebecca Levesque
ArticlesSecurity and AI in the Hybrid Workplace
June 6, 2024
DJ Sampath, vice president of AI at Cisco, provides insights from the 2024 Cisco Cybersecurity Readiness Index on AI, security and the hybrid work landscape
ArticlesCybersecurity in the Quantum Age
June 5, 2024
IBM’s Anne Dames and NIST’s Andrew Regenscheid offer key cybersecurity considerations as the quantum computing era approaches
ArticlesCopy That: A Quick Cautionary Tale About Data Transfers
May 1, 2024
Rob McNelly also shares some IBM Support docs and a scary story of a cyberattack that didn't happen
ArticlesPreparing for DORA: Is Your Enterprise Resilient?
April 15, 2024
Vertali’s Mark Wilson on DORA’s implications, the NIST Cybersecurity Framework and how to respond to cyber incidents
Key AI and Cybersecurity Considerations for 2024
March 19, 2024
IBM security experts Sam Hector and John Dwyer highlight key cybersecurity threats in 2024, including AI and ransomware, and discuss ways to safeguard your IT environment from bad actors
E-BooksMainframe Security in the Age of AI
March 1, 2024
IBM security experts Sam Hector and Didier André weigh in on mainframe cybersecurity in the age of AI and explore how to respond to evolving cyber threats
ArticlesA Closer Look at a Federally Designated Tech Hub
December 15, 2023
This October, the White House announced 31 communities around the country as Regional Innovation and Technology Hubs, called “Tech Hubs.” Each of the Tech Hubs designated will focus on developing innovative technologies such as semiconductors, clean energy, biotechnology, quantum computing, artificial intelligence (AI) and others. The 31 were chosen from nearly 200 applications and are […]
ArticlesVertali zTrust: Detect Network Activity and Control Traffic to Enhance Cybersecurity and Compliance
December 10, 2023
zTrust reveals network activity to and from your mainframe, confirming that your network access controls are correct—and ensures access for authorized users only while denying everyone else. While mainframe sites can have a reasonable view of who is using applications at the userid level, most don’t have an accurate, up-to-date picture of actual network activity. […]
ArticlesThe Complete Beginners’ Guide to Hacking a Mainframe
October 12, 2023
Any movie or TV show makes hacking seem like a trivial affair. A couple of minutes of screen time and some nerdy kid shouts, “I’m in.” Five minutes later, all the data has been stolen and dangerous applications have been rewritten (compiled and executed). We know that’s not how it happens, but the worrying thing […]