Skip to main content

Sort by
Articles

Keep Data out of Danger

John McKenny

April 3, 2017

If you haven’t seen “Attack of the Killer LOBs” yet, it’s coming soon to a DB2* environment near you. No, this isn’t a new science fiction movie—it’s a lurking danger in your environment today. Your vital data may have already been compromised, leaving you with a customer service, legal and compliance nightmare. Even worse, because […]

Articles

Trend Watch: Security

Joseph Gulla

March 27, 2017

This is the sixth post in a multi-part series with a focus on trends that are interesting and important, specifically in enterprise computing. In this post, I’ll continue my point-in-time analysis by looking at the interesting and complex topic of security. z/OS Security When someone says “mainframe security” you probably think RACF. However, if you […]

Articles

Tokenized Encryption: Getting Started

Jim Schesvold

March 1, 2017

When I was engaged to implement cryptography and establish payment card industry (PCI) compliance, it was for a single division of a large conglomerate where each division had its own IT department with differing software, hardware, infrastructure and performed separate implementations. Although my client had the most processing platforms and data stores to integrate, and […]

Articles

Tokenized Encryption: Connecting Docs

Jim Schesvold

February 1, 2017

  This third and final article on documentation examines the information necessary to support a cryptographic interface oriented to CICS Transaction Server and MVS. While the focus is on mainframe environments, the principles and concepts apply to all IT systems. Likewise, except for specific programming languages and software, this information applies to all platforms. Function […]