Skip to main content

Sort by
Articles

How to Defend Your Mainframe From Various Hacking Techniques and Insider Threats

Trevor Eddolls

May 26, 2021

Many people think that their mainframe is totally secure. After all, why wouldn’t it be? For a start, they’re running an external security manager (ESM) that limits what people can do and what they can access. There’s the system authorization facility (SAF), a z/OS interface providing infrastructure-security administration tools that help prevent unauthorized access to […]

Articles

Introducing IBM LinuxONE III Express

Sofia Haan

May 18, 2021

Cloud technology has been growing in popularity for several years, as data-driven, app-based technology has become an integral function of daily life. From business applications to consumer solutions, the cloud is a staple for storing and managing data. To meet the cloud-based data needs of various tech workflows while maintaining a high security standard at […]

E-Books

TechChannel E-book: How to Combat Remote Work Security Risks

TechChannel

May 10, 2021

How remote work has influenced data security trends, and what you can do to keep your data locked down

Articles

Data Encryption Strategies You Can Use to Keep Data Safe—at Work, or at Home

Brad Smith

April 29, 2021

With so many more people working, banking and otherwise living their lives from home and through the internet, there’s been a lot of talk about online safety and encryption. Whether you’ve been searching for ways to tighten your cybersecurity or you’ve been browsing the headlines of the most recent breaches, you’ve probably come across data encryption. […]

Articles

Basic AIX Security Strategies and Best Practices

Jaqui Lynch

April 20, 2021

Security is a very hot topic for a good reason. So much of our personally identifying data is now being stored that the security break-ins that have been happening have most likely affected everyone reading this article. Additionally, the penalties now for breaches of the various standards (HIPAA, PCI, etc) are significant. Good security requires […]

Articles

Cloud Computing to Address Europe’s Growing Data Infrastructure Needs

Saloni Walimbe

April 15, 2021

Rapid penetration of IoT technologies and proliferating smartphone usage has prompted a growth in big data applications. This, in turn, has led to the accelerated development of data centers worldwide. In Europe, in light of the global crisis triggered by the COVID-19 pandemic, several noted companies like Microsoft, Alibaba and NTT have made strategic investments […]

Articles

Accelerating Clinical Trials With Big Data Analytics

Keelia Estrada Moeller

April 14, 2021

We’ve seen several groundbreaking scientific discoveries and technological breakthroughs over the last few years—from the second coming of mRNA, to gene therapies and cell therapies, and of course—emerging COVID-19 treatments and vaccines. If there’s anything this pandemic has taught us, it’s the importance of science and medical research. But these groundbreaking discoveries didn’t emerge out […]

Articles

Defend Your Mainframe Data From Internal Threats

Trevor Eddolls

April 12, 2021

In some blissful past that probably never really existed, mainframe users sat in corporate offices, working on 3270 terminals, and you trusted them because you saw them every day and spoke to them regularly. Nowadays, the world isn’t like that. Mainframe users are most likely accessing the mainframe from a laptop, tablet, or phone. Many […]

Articles

Why Having a Backup and Recovery Plan Improves IBM i Vitality

Jennifer Goforth Gregory

March 26, 2021

Monitoring the vitality of your IBM i system is a cornerstone of keeping your business running 24-7. A key component of IBM i’s vitality includes recovering quickly after a disaster with the least amount of disruption to your customers and revenue streams. Debbie Saugen has heard all the excuses for why a company isn’t prioritizing […]

Articles

The Cybersecurity Market Is Rapidly Growing

Lauren Borchart

March 12, 2021

With the rise of internet usage and availability has also come an increase in cybercrimes like scamming, phishing and hacking. This has created a high demand for cybersecurity protocols and policies to help keep enterprises safe from cyber-attacks. According to a 2020 report from Global Market Insights (GMI), the cybersecurity market has been flourishing in […]

Key Enterprises LLC is committed to ensuring digital accessibility for techchannel.com for people with disabilities. We are continually improving the user experience for everyone, and applying the relevant accessibility standards.