How to Defend Your Mainframe From Various Hacking Techniques and Insider Threats
May 26, 2021
Many people think that their mainframe is totally secure. After all, why wouldn’t it be? For a start, they’re running an external security manager (ESM) that limits what people can do and what they can access. There’s the system authorization facility (SAF), a z/OS interface providing infrastructure-security administration tools that help prevent unauthorized access to […]
ArticlesIntroducing IBM LinuxONE III Express
May 18, 2021
Cloud technology has been growing in popularity for several years, as data-driven, app-based technology has become an integral function of daily life. From business applications to consumer solutions, the cloud is a staple for storing and managing data. To meet the cloud-based data needs of various tech workflows while maintaining a high security standard at […]
E-BooksTechChannel E-book: How to Combat Remote Work Security Risks
May 10, 2021
How remote work has influenced data security trends, and what you can do to keep your data locked down
ArticlesData Encryption Strategies You Can Use to Keep Data Safe—at Work, or at Home
April 29, 2021
With so many more people working, banking and otherwise living their lives from home and through the internet, there’s been a lot of talk about online safety and encryption. Whether you’ve been searching for ways to tighten your cybersecurity or you’ve been browsing the headlines of the most recent breaches, you’ve probably come across data encryption. […]
ArticlesBasic AIX Security Strategies and Best Practices
April 20, 2021
Security is a very hot topic for a good reason. So much of our personally identifying data is now being stored that the security break-ins that have been happening have most likely affected everyone reading this article. Additionally, the penalties now for breaches of the various standards (HIPAA, PCI, etc) are significant. Good security requires […]
Cloud Computing to Address Europe’s Growing Data Infrastructure Needs
April 15, 2021
Rapid penetration of IoT technologies and proliferating smartphone usage has prompted a growth in big data applications. This, in turn, has led to the accelerated development of data centers worldwide. In Europe, in light of the global crisis triggered by the COVID-19 pandemic, several noted companies like Microsoft, Alibaba and NTT have made strategic investments […]
ArticlesAccelerating Clinical Trials With Big Data Analytics
April 14, 2021
We’ve seen several groundbreaking scientific discoveries and technological breakthroughs over the last few years—from the second coming of mRNA, to gene therapies and cell therapies, and of course—emerging COVID-19 treatments and vaccines. If there’s anything this pandemic has taught us, it’s the importance of science and medical research. But these groundbreaking discoveries didn’t emerge out […]
ArticlesDefend Your Mainframe Data From Internal Threats
April 12, 2021
In some blissful past that probably never really existed, mainframe users sat in corporate offices, working on 3270 terminals, and you trusted them because you saw them every day and spoke to them regularly. Nowadays, the world isn’t like that. Mainframe users are most likely accessing the mainframe from a laptop, tablet, or phone. Many […]
ArticlesWhy Having a Backup and Recovery Plan Improves IBM i Vitality
March 26, 2021
Monitoring the vitality of your IBM i system is a cornerstone of keeping your business running 24-7. A key component of IBM i’s vitality includes recovering quickly after a disaster with the least amount of disruption to your customers and revenue streams. Debbie Saugen has heard all the excuses for why a company isn’t prioritizing […]
ArticlesThe Cybersecurity Market Is Rapidly Growing
March 12, 2021
With the rise of internet usage and availability has also come an increase in cybercrimes like scamming, phishing and hacking. This has created a high demand for cybersecurity protocols and policies to help keep enterprises safe from cyber-attacks. According to a 2020 report from Global Market Insights (GMI), the cybersecurity market has been flourishing in […]