Skip to main content

Sort by
Articles

Latest IBM Storage Announcements Address Key Hybrid Cloud Pain Points for Clients

Keelia Estrada Moeller

October 12, 2021

As hybrid cloud environments grow in popularity, organizations must develop strategies that address increasing IT complexity, public cloud costs, cyberattack threats and other data destructive events. Today, IBM in announcing new capabilities and integrations designed to mitigate these pain points—helping organizations reduce IT complexity, deploy cost-effective solutions and improve cyberresilience across hybrid cloud environments. These […]

Podcasts

Carol Woodbury on Security Strategies and Best Practices

Charlie Guarino

October 4, 2021

Charlie Guarino: Hi everybody. This is Charlie Guarino. Welcome to another edition of TechTalk SMB. I am so happy today to sit down and have a nice chat with the former IBM i security architect of IBM i and the current co-founder of DXR Security, a company that helps organizations change their IBM i security one […]

Articles

The Cost of Enterprise Downtime

Laura DiDio

September 30, 2021

Enterprise downtime is now more expensive than ever: Some 44% of firms indicate that hourly downtime costs exceed $1 million to over $5 million, exclusive of any legal fees, fines or penalties. Additionally, 91% organizations said a single hour of downtime that takes mission-critical server hardware and applications offline, averages over $300,000 due to lost […]

Articles

How Much Does a Data Breach Cost?

Trevor Eddolls

September 21, 2021

For the past 16 years, IBM has published research by the Ponemon Institute in the annual “Cost of a Data Breach Report.” Its 17th report was published at the end of July this year, and perhaps the biggest finding was that 2020 had the highest average cost for a data breach in 17 years. The cost […]

Articles

Random and ‘Almost Random’ Numbers on z/OS

David Stephens

September 17, 2021

Random numbers can come in handy. They can be used to create a unique filename, generate a random new password, or randomly select a record. The good news is that we can obtain random numbers on z/OS. Well, at least some of them are random. COBOL and RANDOM A quick look at the IBM Enterprise […]

Articles

Of Wildcards, Regular Expressions and Mainframe Security

Reg Harbeck

September 14, 2021

As Sigmund Freud might say if he were alive today, “Sometimes, a dash is just a dash.” Of course, if he did, he’d likely be talking about one of the two wildcard characters that do all the heavy lifting in CA ACF2. That’s right: ACF2 only has two wildcard characters—or actually, fewer than two: the […]

Articles

IBM Delivers a Frictionless Hybrid Cloud Experience With the New Power10-Equipped E1080 Server

Keelia Estrada Moeller

September 8, 2021

Today, IBM announced the new IBM Power E1080 server—the first in a new family of servers based on the new IBM Power10 processor. With the Power10-equipped E1080 server, IBM is providing clients with a frictionless hybrid cloud experience across their entire IT infrastructure. The Power E1080 server is built around the revolutionary IBM Power10 processor. […]

Articles

Installing an ifix With AIX Live Update

Chris Gibson

September 1, 2021

Chris Gibson explains how to install an AIX security ifix without a reboot

Articles

Kubernetes Container Security Best Practices With Red Hat Advanced Cluster Security for Kubernetes

Cayla Jenkins

August 30, 2021

As we work with organizations who are adopting containers as part of their software development strategy, we have seen container security become a challenge for many, and at times an aftersight. This is not on purpose, but primarily a result of the vast differences between the new technology of containers versus the virtualization model many […]

Articles

Evil Mainframe Brings Ethical Hacking to the Forefront

Tiffany Lukk

August 26, 2021

When it comes to hacking, there are courses that can teach you to break past the security of almost anything. However, learning how to hack a mainframe usually isn’t one of them. That’s why Chad Rikansrud and Phil Young created Evil Mainframe, the first mainframe penetration testing class. “The IT world at large has benefited […]