Skip to main content

Sort by
Articles

Open Firmware Macros Tips, and a Closer Look at Power10 Servers

Rob McNelly

September 2, 2022

Rob McNelly highlights tips on open firmware macros, recaps Nigel Griffith’s closer look at Power10 Servers, explores AIX security bulletins and more

Podcasts

John Connors and Milt Rosberg on Mainframe Security and Pervasive Encryption

August 4, 2022

Reg Harbeck: Hi, I’m Reg Harbeck and today I’m here with Milt Rosberg, who is global VP at Vanguard Integrity Professionals, and John Connors, who is CEO at Vanguard Integrity Professionals. And so John, maybe if you could tell us: How did you end up in the world of mainframe and security? John Connors: Well […]

Sponsored Content by
Vanguard Integrity Professionals

Articles

IBM Bolsters Power10 Servers With Scalability and Security Capabilities for Hybrid Cloud

Laura DiDio

July 12, 2022

IBM today took a big step to expand its Power10 server enterprise presence with the introduction of scale-out systems designed to modernize, secure and automate business applications and IT operations, particularly in hybrid cloud environments. A Look at the New Servers The latest Power10 servers meld performance, scalability, flexibility and top-notch reliability and security with […]

E-Books

How to Create a Security Strategy That’s Built to Last

May 15, 2022

More accessible technology, economic and political volatility, and evolving hacking techniques mean that security personnel face different challenges than they did five years ago. Organizations must develop a reliable security strategy to keep up with data security needs. Part of this strategy begins with the security basics: assess your environment, implement end-user education, enforce password […]

Sponsored Content by
Blair Technology Solutions

Articles

Filtering IP Addresses With AIX IPSec

Chris Gibson

May 10, 2022

Do you need to block a specific IP address or host from accessing your AIX system? One approach is to use AIX IP security (IPSec) to filter specific IP addresses. Learn how here.

E-Books

Key Considerations for an Effective, Long-Term Security Strategy

May 8, 2022

More accessible technology, economic and political volatility, and evolving hacking techniques mean that security personnel face different challenges than they did five years ago. Organizations must develop a reliable security strategy to keep up with data security needs. Part of this strategy begins with the security basics: assess your environment, implement end-user education, enforce password […]

Articles

IBM, Lenovo, HPE and Huawei Servers Rank as Most Secure Platforms in ITIC Survey

Laura DiDio

April 20, 2022

IBM, Lenovo, Huawei and Hewlett-Packard enterprise servers ranked as the most secure platforms in an ITIC survey—experiencing the fewest number of successful data breaches

Articles

Log4Shell Part 2: 3 Best Practices for Software Security

Jesse Gorzinski

January 6, 2022

Log4Shell and others provide a constant reminder that IT security is a perpetual task. Jesse Gorzinski highlights three security best practices you should follow to keep software secure.

Articles

Apache Log4j Vulnerability, AIX Tips and Tools, a Look at Time Drift, and More

Rob McNelly

January 4, 2022

IBM Champion Rob McNelly on the Log4j security vulnerability, helpful AIX tips and tools, time drifts on POWER8 and POWER9 servers, and more

Articles

Log4Shell Part 1: Answering FAQs on the Log4Shell Security Vulnerability

Jesse Gorzinski

December 14, 2021

Jesse Gorzinksi on the Log4Shell security vulnerability, what it impacts and how to remediate the problem in Java programs

Key Enterprises LLC is committed to ensuring digital accessibility for techchannel.com for people with disabilities. We are continually improving the user experience for everyone, and applying the relevant accessibility standards.