CICS Security, TLS Enhancement, Updated CICS Documentation and More
August 23, 2021
The Virtual CICS user group is an online user group that has been meeting for over 10 years. It meets every other month, which works out at six meetings each year. And, at each meeting, there’s a presentation. At the July meeting, Colin Penfold, technical leader for IBM CICS Transaction Server Security, spoke about recent […]
ArticlesIBM Announces IBM z/OS V2.5
July 28, 2021
According to an IBM Institute for Business Value study “Application modernization on the mainframe” released today, 71% of executives surveyed say mainframe-based applications are central to their business strategy; and in three years, the percentage of organizations leveraging mainframe assets in a hybrid cloud environment is expected to increase by more than 2x. With this in […]
Articles5 Reasons to Choose Open-Source Solutions for Software Development
June 16, 2021
Open source has revolutionized the software development industry. Open source means that the software created is released under a license that allows anyone to use it. The code is also distributed along with the software. Some of the most commonly used software systems in the world are open source. For example, the Firefox web browser […]
E-BooksTechChannel E-book: Why Knowing Your Organization’s Security Needs Can Help Keep Data Locked Down
June 7, 2021
IBM Power Systems hardware and AIX are innately secure—but even top-notch security requires monitoring, patching and security planning to guard against bad actors and keep data locked down. Complacency is a recipe for disaster when it comes to security. An effective security plan requires a multilayered approach that starts with people, then physical security measures, […]
ArticlesSecurity Analytics Market to Gain Traction Across Healthcare Sector
June 7, 2021
The global market for security analytics solutions and services is set to churn out massive profits in 2021 and beyond. Here’s how: The 21st century is no doubt one of the profitable eras for large-scale digitization. With massive shifts toward digital platforms being a protocol of the current COVID-19 age, digitization has, perhaps, touched the apex. […]
Steve Pitcher on Malware Threats to IBM i
June 1, 2021
New: Subscribe to TechChannel podcasts on Apple. Paul Tuohy: Okay. Hi everyone, welcome to another iTalk with Tuohy. I’m delighted to—well, actually, I don’t know if I am delighted because we’re going to be talking about something that’s terrifying the life out of me so anyway welcome back to iTalk Steve Pitcher from iTech Solutions. Steve, how […]
ArticlesHow to Defend Your Mainframe From Various Hacking Techniques and Insider Threats
May 26, 2021
Many people think that their mainframe is totally secure. After all, why wouldn’t it be? For a start, they’re running an external security manager (ESM) that limits what people can do and what they can access. There’s the system authorization facility (SAF), a z/OS interface providing infrastructure-security administration tools that help prevent unauthorized access to […]
ArticlesIntroducing IBM LinuxONE III Express
May 18, 2021
Cloud technology has been growing in popularity for several years, as data-driven, app-based technology has become an integral function of daily life. From business applications to consumer solutions, the cloud is a staple for storing and managing data. To meet the cloud-based data needs of various tech workflows while maintaining a high security standard at […]
E-BooksTechChannel E-book: How to Combat Remote Work Security Risks
May 10, 2021
How remote work has influenced data security trends, and what you can do to keep your data locked down
ArticlesData Encryption Strategies You Can Use to Keep Data Safe—at Work, or at Home
April 29, 2021
With so many more people working, banking and otherwise living their lives from home and through the internet, there’s been a lot of talk about online safety and encryption. Whether you’ve been searching for ways to tighten your cybersecurity or you’ve been browsing the headlines of the most recent breaches, you’ve probably come across data encryption. […]