The Rise of No-Code Cybercrime
May 12, 2025
How technological advancements and new forms of criminal cooperation are giving cybersecurity professionals more to think about
E-BooksHow Hacking Got Easy
May 5, 2025
Technological advancements and new forms of criminal cooperation are giving cybersecurity professionals more to think about
ArticlesAnnouncing Manzan: The Future of IBM i Event Monitoring
April 25, 2025
The open source project is designed to simplify the process of publishing IBM i system events
Press ReleasesBroadcom Introduces Industry’s First Incident Prediction Capability to Stop Living-Off-The-Land Attacks
April 18, 2025
Leveraging advanced AI, Symantec Endpoint Security can predict cybercriminals’ moves in the attack chain, quickly stop them and return organizations to a state of cyber resilience.
ArticlesAnnouncing IBM i 7.6 and IBM i 7.5 TR6
April 8, 2025
IBM i CTO Steve Will covers enhancements for security, database, system administration, application development and HA/DR
Jitterbit Study Shows Growing Appetite for AI, Automation to Solve ‘Data Divide,’ Resource Constraints
March 28, 2025
Press Releases
MainTegrity Introduces Solution to Stop Data Exfiltration in Seconds
March 14, 2025
MainTegrity Inc., a leader in ransomware protection for IBM mainframes, announces the first integrated software solution for intercepting data theft, a common threat vector used by cyber criminals.
Press ReleasesShield Takes IBM i Monitoring Solution AAG to New Heights with Ansible
March 12, 2025
With Ansible integration, AAG now offers a game-changing capability: automated remediation.
Press ReleasesVertali Launches ‘Mainframe Shield’ Security Awareness Initiative
March 10, 2025
The initiative focuses on the risks facing organizations and the need to work collaboratively to protect sensitive data and secure mission-critical applications.
ArticlesStrategies for Preventing New Mainframe Data Exfiltration Vulnerabilities
March 3, 2025
MainTegrity CEO Al Saurette outlines the multi-facted approach required to protect sensitive data from exfiltration, including file integrity monitoring, behavioral anomaly analysis, access controls and data encryption