Skip to main content

Sort by
Articles

CICS Security, TLS Enhancement, Updated CICS Documentation and More

Trevor Eddolls

August 23, 2021

The Virtual CICS user group is an online user group that has been meeting for over 10 years. It meets every other month, which works out at six meetings each year. And, at each meeting, there’s a presentation. At the July meeting, Colin Penfold, technical leader for IBM CICS Transaction Server Security, spoke about recent […]

Articles

IBM Announces IBM z/OS V2.5

TechChannel

July 28, 2021

According to an IBM Institute for Business Value study “Application modernization on the mainframe” released today, 71% of executives surveyed say mainframe-based applications are central to their business strategy; and in three years, the percentage of organizations leveraging mainframe assets in a hybrid cloud environment is expected to increase by more than 2x. With this in […]

Articles

5 Reasons to Choose Open-Source Solutions for Software Development

Tyler Boykin

June 16, 2021

Open source has revolutionized the software development industry. Open source means that the software created is released under a license that allows anyone to use it. The code is also distributed along with the software. Some of the most commonly used software systems in the world are open source. For example, the Firefox web browser […]

E-Books

TechChannel E-book: Why Knowing Your Organization’s Security Needs Can Help Keep Data Locked Down

TechChannel

June 7, 2021

IBM Power Systems hardware and AIX are innately secure—but even top-notch security requires monitoring, patching and security planning to guard against bad actors and keep data locked down. Complacency is a recipe for disaster when it comes to security. An effective security plan requires a multilayered approach that starts with people, then physical security measures, […]

Articles

Security Analytics Market to Gain Traction Across Healthcare Sector

Vinisha Joshi

June 7, 2021

The global market for security analytics solutions and services is set to churn out massive profits in 2021 and beyond. Here’s how: The 21st century is no doubt one of the profitable eras for large-scale digitization. With massive shifts toward digital platforms being a protocol of the current COVID-19 age, digitization has, perhaps, touched the apex. […]

Podcasts

Steve Pitcher on Malware Threats to IBM i

Paul Tuohy

June 1, 2021

New: Subscribe to TechChannel podcasts on Apple. Paul Tuohy: Okay. Hi everyone, welcome to another iTalk with Tuohy. I’m delighted to—well, actually, I don’t know if I am delighted because we’re going to be talking about something that’s terrifying the life out of me so anyway welcome back to iTalk Steve Pitcher from iTech Solutions. Steve, how […]

Articles

How to Defend Your Mainframe From Various Hacking Techniques and Insider Threats

Trevor Eddolls

May 26, 2021

Many people think that their mainframe is totally secure. After all, why wouldn’t it be? For a start, they’re running an external security manager (ESM) that limits what people can do and what they can access. There’s the system authorization facility (SAF), a z/OS interface providing infrastructure-security administration tools that help prevent unauthorized access to […]

Articles

Introducing IBM LinuxONE III Express

Sofia Haan

May 18, 2021

Cloud technology has been growing in popularity for several years, as data-driven, app-based technology has become an integral function of daily life. From business applications to consumer solutions, the cloud is a staple for storing and managing data. To meet the cloud-based data needs of various tech workflows while maintaining a high security standard at […]

E-Books

TechChannel E-book: How to Combat Remote Work Security Risks

TechChannel

May 10, 2021

How remote work has influenced data security trends, and what you can do to keep your data locked down

Articles

Data Encryption Strategies You Can Use to Keep Data Safe—at Work, or at Home

Brad Smith

April 29, 2021

With so many more people working, banking and otherwise living their lives from home and through the internet, there’s been a lot of talk about online safety and encryption. Whether you’ve been searching for ways to tighten your cybersecurity or you’ve been browsing the headlines of the most recent breaches, you’ve probably come across data encryption. […]