Skip to main content

Sort by
Articles

IBM LinuxONE Emperor 4: Sustainability, Security, Flexibility

Dava Stewart

September 13, 2022

The IBM LinuxONE Emperor 4 server introduced today (September 13, 2022) is designed to help IT professionals address some of the most pressing issues facing the industry today. The new product increases efficiencies, reduces energy consumption, improves security and provides flexibility in a highly scalable infrastructure. Emperor 4 will be available at the enterprise level […]

Podcasts

The Ongoing Challenge of Keeping Personal Data Private

Charlie Guarino

August 22, 2022

Charlie Guarino: Hi everybody, this is Charlie Guarino. Welcome to another edition of TechTalk SMB. I’m very happy today to be sitting with the vice president of strategy, CTO and CISO, which is the chief information security officer, of Arcad Software, none other than Mr. Michel Mouchon. Michel, what a pleasure it is to be […]

Podcasts

John Connors and Milt Rosberg on Mainframe Security and Pervasive Encryption

August 4, 2022

Reg Harbeck: Hi, I’m Reg Harbeck and today I’m here with Milt Rosberg, who is global VP at Vanguard Integrity Professionals, and John Connors, who is CEO at Vanguard Integrity Professionals. And so John, maybe if you could tell us: How did you end up in the world of mainframe and security? John Connors: Well […]

Sponsored Content by
Vanguard Integrity Professionals

Articles

Future-Proof Your IBM i Applications

Dan Magid

July 20, 2022

A look at top IBM i concerns, and how to address them through determining best practices for modernization, security, and future planning for IBM i applications

Articles

IBM Expands the Power10 Portfolio

Dava Stewart

July 12, 2022

Today, IBM announced that it has expanded its Power10 portfolio. First introduced in September 2021, Power10 was designed to meet the needs of enterprise-level organizations. The newly announced portfolio additions bring the same advantages to mid-sized and small organizations with mid-range and scale-out systems. These products are designed to help smaller and mid-sized organizations improve […]

Articles

Data Breach Impacts and Top Prevention Strategies

TechChannel

July 6, 2022

In the today’s data-driven society, corporate security breaches have the power and capacity to impact mass amounts of technology users at a time. In fact, some of the most sizable security data breaches have taken place during the past decade. Forbes Advisor examined the data taken from FBI’s Internet Crime Complaint Center (IC3) between 2017 to 2021 to uncover […]

Articles

How to Create a Business Continuity and Disaster Recovery Plan

Jennifer Radulovic Hughes

June 7, 2022

In IT operations, there is a constant threat of equipment failures, site outages or chaos erupting after work hours. Keeping IT operations uninterrupted is vital to maintaining the security and accessibility of sensitive company data for small businesses and large organizations alike. Doing so requires new business continuity measures, especially as data storage devices continue […]

Articles

IBM z16 Accelerates AI, Simplifies Compliance, Safeguards Data and Avoids Outages

Neil Tardy

June 7, 2022

Following the IBM z16 GA on May 31, IBM’s Kelly Pushong highlights key IBM z16 benefits, community reactions and the importance of collaboration for this latest zSystems release

Articles

The New IBM ESS 3500 Unlocks the Power of Data

Dava Stewart

June 3, 2022

Companies today know that operational insights are inherent in their data. Artificial intelligence (AI) and machine learning (ML) have the power to unlock that value, but data complexity and silos make accessing, analyzing, and acting on stored data difficult. The recently announced IBM ESS 3500 global data platform addresses these challenges, making data delivery for […]

Articles

Mainframe Security: Are There More Gaps in Your Defenses Than You Thought?

Trevor Eddolls

May 16, 2022

Hackers are always trying to find ways into your mainframe and exfiltrate your data. Trying to stay ahead of their ingenuity can be hard work. Luckily, penetration testers are doing that work for us, and we can learn a lot from them about how to strengthen our defenses. Threats to the Mainframe When people talk […]