How to Create a Business Continuity and Disaster Recovery Plan
June 7, 2022
In IT operations, there is a constant threat of equipment failures, site outages or chaos erupting after work hours. Keeping IT operations uninterrupted is vital to maintaining the security and accessibility of sensitive company data for small businesses and large organizations alike. Doing so requires new business continuity measures, especially as data storage devices continue […]
ArticlesIBM z16 Accelerates AI, Simplifies Compliance, Safeguards Data and Avoids Outages
June 7, 2022
Following the IBM z16 GA on May 31, IBM’s Kelly Pushong highlights key IBM z16 benefits, community reactions and the importance of collaboration for this latest zSystems release
ArticlesThe New IBM ESS 3500 Unlocks the Power of Data
June 3, 2022
Companies today know that operational insights are inherent in their data. Artificial intelligence (AI) and machine learning (ML) have the power to unlock that value, but data complexity and silos make accessing, analyzing, and acting on stored data difficult. The recently announced IBM ESS 3500 global data platform addresses these challenges, making data delivery for […]
ArticlesMainframe Security: Are There More Gaps in Your Defenses Than You Thought?
May 16, 2022
Hackers are always trying to find ways into your mainframe and exfiltrate your data. Trying to stay ahead of their ingenuity can be hard work. Luckily, penetration testers are doing that work for us, and we can learn a lot from them about how to strengthen our defenses. Threats to the Mainframe When people talk […]
ArticlesFiltering IP Addresses With AIX IPSec
May 10, 2022
Do you need to block a specific IP address or host from accessing your AIX system? One approach is to use AIX IP security (IPSec) to filter specific IP addresses. Learn how here.
IBM, Lenovo, HPE and Huawei Servers Rank as Most Secure Platforms in ITIC Survey
April 20, 2022
IBM, Lenovo, Huawei and Hewlett-Packard enterprise servers ranked as the most secure platforms in an ITIC survey—experiencing the fewest number of successful data breaches
ArticlesHighlights From the 2022 X-Force Threat Intelligence Index
April 8, 2022
The annual X-Force Threat Intelligence Index from IBM Security is always a sobering read, and the 2022 edition is no exception. Here, we highlight some of the key security findings, statistics and trends in the report. Cyberattacks by the Numbers This year’s report outlines that phishing was the most common cause of cyberattacks in 2021. […]
ArticlesIBM Aims for the Hybrid Cloud and Increases Security With the New z16
April 5, 2022
IBM today unveiled the z16 enterprise server, the latest release in its line of IBM Z mainframe systems. The new z16 delivers a slew of embedded, advanced capabilities aimed at hardening security, boosting performance, delivering greater value and cost efficiencies, and making analytics accessible and easy to use for non-data scientists to deliver immediate value. […]
PodcastsThe Impact of Log4j in the Open-Source Ecosystem
March 1, 2022
Charlie Guarino: Hi everybody. This is Charlie Guarino. Welcome to another edition of TechTalk SMB. I'm sitting here today with the business architect for open-source technology for IBM i Jesse Gorzinski. Jesse, thank you for joining us here today for this podcast. Jesse Gorzinski: You bet. Thanks for having me on Charlie. Charlie: […]
ArticlesExtending Cyberresilience Capabilities
February 22, 2022
Managing and maintaining storage networks was never easy, but over the past two years, the responsibilities and challenges that come with the job have multiplied and diversified. Administrators must provide secure access to networks that extend beyond virtual corporate boundaries to serve an ever-growing work from home user base. Ransomware and other threats to data […]