Skip to main content

Sort by
Podcasts

John Connors and Milt Rosberg on Mainframe Security and Pervasive Encryption

August 4, 2022

Reg Harbeck: Hi, I’m Reg Harbeck and today I’m here with Milt Rosberg, who is global VP at Vanguard Integrity Professionals, and John Connors, who is CEO at Vanguard Integrity Professionals. And so John, maybe if you could tell us: How did you end up in the world of mainframe and security? John Connors: Well […]

Sponsored Content by
Vanguard Integrity Professionals

Articles

Future-Proof Your IBM i Applications

Dan Magid

July 20, 2022

A look at top IBM i concerns, and how to address them through determining best practices for modernization, security, and future planning for IBM i applications

Articles

IBM Expands the Power10 Portfolio

Dava Stewart

July 12, 2022

Today, IBM announced that it has expanded its Power10 portfolio. First introduced in September 2021, Power10 was designed to meet the needs of enterprise-level organizations. The newly announced portfolio additions bring the same advantages to mid-sized and small organizations with mid-range and scale-out systems. These products are designed to help smaller and mid-sized organizations improve […]

Articles

Data Breach Impacts and Top Prevention Strategies

TechChannel

July 6, 2022

In the today’s data-driven society, corporate security breaches have the power and capacity to impact mass amounts of technology users at a time. In fact, some of the most sizable security data breaches have taken place during the past decade. Forbes Advisor examined the data taken from FBI’s Internet Crime Complaint Center (IC3) between 2017 to 2021 to uncover […]

Articles

How to Create a Business Continuity and Disaster Recovery Plan

Jennifer Radulovic Hughes

June 7, 2022

In IT operations, there is a constant threat of equipment failures, site outages or chaos erupting after work hours. Keeping IT operations uninterrupted is vital to maintaining the security and accessibility of sensitive company data for small businesses and large organizations alike. Doing so requires new business continuity measures, especially as data storage devices continue […]

Articles

IBM z16 Accelerates AI, Simplifies Compliance, Safeguards Data and Avoids Outages

Neil Tardy

June 7, 2022

Following the IBM z16 GA on May 31, IBM’s Kelly Pushong highlights key IBM z16 benefits, community reactions and the importance of collaboration for this latest zSystems release

Articles

The New IBM ESS 3500 Unlocks the Power of Data

Dava Stewart

June 3, 2022

Companies today know that operational insights are inherent in their data. Artificial intelligence (AI) and machine learning (ML) have the power to unlock that value, but data complexity and silos make accessing, analyzing, and acting on stored data difficult. The recently announced IBM ESS 3500 global data platform addresses these challenges, making data delivery for […]

Articles

Mainframe Security: Are There More Gaps in Your Defenses Than You Thought?

Trevor Eddolls

May 16, 2022

Hackers are always trying to find ways into your mainframe and exfiltrate your data. Trying to stay ahead of their ingenuity can be hard work. Luckily, penetration testers are doing that work for us, and we can learn a lot from them about how to strengthen our defenses. Threats to the Mainframe When people talk […]

Articles

Filtering IP Addresses With AIX IPSec

Chris Gibson

May 10, 2022

Do you need to block a specific IP address or host from accessing your AIX system? One approach is to use AIX IP security (IPSec) to filter specific IP addresses. Learn how here.

Articles

IBM, Lenovo, HPE and Huawei Servers Rank as Most Secure Platforms in ITIC Survey

Laura DiDio

April 20, 2022

IBM, Lenovo, Huawei and Hewlett-Packard enterprise servers ranked as the most secure platforms in an ITIC survey—experiencing the fewest number of successful data breaches

Key Enterprises LLC is committed to ensuring digital accessibility for techchannel.com for people with disabilities. We are continually improving the user experience for everyone, and applying the relevant accessibility standards.