Westley McDuffie on Zero Trust and Data Security
February 1, 2023
Charlie Guarino: Hi everybody. Welcome to yet another edition of TechTalk SMB. In today’s podcast I am really thrilled to be sitting here with Westley McDuffie. Westley is an IBM security evangelist working with the federal sales team supporting DOD and the intelligence community clients. Westley is responsible for educating IBM’s federal customers, from building […]
ArticlesIBM Announces Diamondback Tape Library
October 20, 2022
Today, IBM announced its latest archival storage solution: IBM Diamondback Tape Library. An extension of IBM’s comprehensive portfolio of data resilience solutions, IBM Diamondback is designed for organizations seeking to store hundreds of petabytes (PB) of data both securely and sustainably. This cost-effective storage solution enhances sustainability with its energy-efficient infrastructure and reduced environmental impact. […]
ArticlesOpen Firmware Macros Tips, and a Closer Look at Power10 Servers
September 2, 2022
Rob McNelly highlights tips on open firmware macros, recaps Nigel Griffith’s closer look at Power10 Servers, explores AIX security bulletins and more
PodcastsJohn Connors and Milt Rosberg on Mainframe Security and Pervasive Encryption
August 4, 2022
Reg Harbeck: Hi, I’m Reg Harbeck and today I’m here with Milt Rosberg, who is global VP at Vanguard Integrity Professionals, and John Connors, who is CEO at Vanguard Integrity Professionals. And so John, maybe if you could tell us: How did you end up in the world of mainframe and security? John Connors: Well […]
Sponsored Content by
Vanguard Integrity Professionals
IBM Bolsters Power10 Servers With Scalability and Security Capabilities for Hybrid Cloud
July 12, 2022
IBM today took a big step to expand its Power10 server enterprise presence with the introduction of scale-out systems designed to modernize, secure and automate business applications and IT operations, particularly in hybrid cloud environments. A Look at the New Servers The latest Power10 servers meld performance, scalability, flexibility and top-notch reliability and security with […]
How to Create a Security Strategy That’s Built to Last
May 15, 2022
More accessible technology, economic and political volatility, and evolving hacking techniques mean that security personnel face different challenges than they did five years ago. Organizations must develop a reliable security strategy to keep up with data security needs. Part of this strategy begins with the security basics: assess your environment, implement end-user education, enforce password […]
Sponsored Content by
Blair Technology Solutions inc.
Filtering IP Addresses With AIX IPSec
May 10, 2022
Do you need to block a specific IP address or host from accessing your AIX system? One approach is to use AIX IP security (IPSec) to filter specific IP addresses. Learn how here.
E-BooksKey Considerations for an Effective, Long-Term Security Strategy
May 8, 2022
More accessible technology, economic and political volatility, and evolving hacking techniques mean that security personnel face different challenges than they did five years ago. Organizations must develop a reliable security strategy to keep up with data security needs. Part of this strategy begins with the security basics: assess your environment, implement end-user education, enforce password […]
ArticlesIBM, Lenovo, HPE and Huawei Servers Rank as Most Secure Platforms in ITIC Survey
April 20, 2022
IBM, Lenovo, Huawei and Hewlett-Packard enterprise servers ranked as the most secure platforms in an ITIC survey—experiencing the fewest number of successful data breaches
ArticlesLog4Shell Part 2: 3 Best Practices for Software Security
January 6, 2022
Log4Shell and others provide a constant reminder that IT security is a perpetual task. Jesse Gorzinski highlights three security best practices you should follow to keep software secure.