Latest IBM Storage Announcements Address Key Hybrid Cloud Pain Points for Clients
October 12, 2021
As hybrid cloud environments grow in popularity, organizations must develop strategies that address increasing IT complexity, public cloud costs, cyberattack threats and other data destructive events. Today, IBM in announcing new capabilities and integrations designed to mitigate these pain points—helping organizations reduce IT complexity, deploy cost-effective solutions and improve cyberresilience across hybrid cloud environments. These […]
PodcastsCarol Woodbury on Security Strategies and Best Practices
October 4, 2021
Charlie Guarino: Hi everybody. This is Charlie Guarino. Welcome to another edition of TechTalk SMB. I am so happy today to sit down and have a nice chat with the former IBM i security architect of IBM i and the current co-founder of DXR Security, a company that helps organizations change their IBM i security one […]
ArticlesThe Cost of Enterprise Downtime
September 30, 2021
Enterprise downtime is now more expensive than ever: Some 44% of firms indicate that hourly downtime costs exceed $1 million to over $5 million, exclusive of any legal fees, fines or penalties. Additionally, 91% organizations said a single hour of downtime that takes mission-critical server hardware and applications offline, averages over $300,000 due to lost […]
ArticlesHow Much Does a Data Breach Cost?
September 21, 2021
For the past 16 years, IBM has published research by the Ponemon Institute in the annual “Cost of a Data Breach Report.” Its 17th report was published at the end of July this year, and perhaps the biggest finding was that 2020 had the highest average cost for a data breach in 17 years. The cost […]
ArticlesRandom and ‘Almost Random’ Numbers on z/OS
September 17, 2021
Random numbers can come in handy. They can be used to create a unique filename, generate a random new password, or randomly select a record. The good news is that we can obtain random numbers on z/OS. Well, at least some of them are random. COBOL and RANDOM A quick look at the IBM Enterprise […]
Of Wildcards, Regular Expressions and Mainframe Security
September 14, 2021
As Sigmund Freud might say if he were alive today, “Sometimes, a dash is just a dash.” Of course, if he did, he’d likely be talking about one of the two wildcard characters that do all the heavy lifting in CA ACF2. That’s right: ACF2 only has two wildcard characters—or actually, fewer than two: the […]
ArticlesIBM Delivers a Frictionless Hybrid Cloud Experience With the New Power10-Equipped E1080 Server
September 8, 2021
Today, IBM announced the new IBM Power E1080 server—the first in a new family of servers based on the new IBM Power10 processor. With the Power10-equipped E1080 server, IBM is providing clients with a frictionless hybrid cloud experience across their entire IT infrastructure. The Power E1080 server is built around the revolutionary IBM Power10 processor. […]
ArticlesInstalling an ifix With AIX Live Update
September 1, 2021
Chris Gibson explains how to install an AIX security ifix without a reboot
ArticlesKubernetes Container Security Best Practices With Red Hat Advanced Cluster Security for Kubernetes
August 30, 2021
As we work with organizations who are adopting containers as part of their software development strategy, we have seen container security become a challenge for many, and at times an aftersight. This is not on purpose, but primarily a result of the vast differences between the new technology of containers versus the virtualization model many […]
ArticlesEvil Mainframe Brings Ethical Hacking to the Forefront
August 26, 2021
When it comes to hacking, there are courses that can teach you to break past the security of almost anything. However, learning how to hack a mainframe usually isn’t one of them. That’s why Chad Rikansrud and Phil Young created Evil Mainframe, the first mainframe penetration testing class. “The IT world at large has benefited […]