Skip to main content

Sort by
Podcasts

Kisco Systems Celebrates 40 Years

Peg Tuttle

January 19, 2024

This transcript is edited for clarity. Peg Tuttle: All right ladies and gentlemen, get ready to power up your day because it’s time for PowerTalk with Peg Tuttle. I’m Peg Tuttle, your host, and I’m here to bring you the latest tech insights, trends, and power packed conversations that will leave you inspired and ready […]

Articles

Why Your IBM i Environment Absolutely Needs Antivirus Protection

Steve Pitcher

December 10, 2023

While highly securable, IBM i environments remain vulnerable to ransomware due to outdated practices, unsecured file shares and weak password policies. Antivirus protection and modern security protocols are essential to mitigate risks.

Sponsored Content by
Service Express

Articles

Vertali zTrust: Detect Network Activity and Control Traffic to Enhance Cybersecurity and Compliance

December 10, 2023

zTrust reveals network activity to and from your mainframe, confirming that your network access controls are correct—and ensures access for authorized users only while denying everyone else. While mainframe sites can have a reasonable view of who is using applications at the userid level, most don’t have an accurate, up-to-date picture of actual network activity. […]

Podcasts

The Balancing Act Between Security and Maintenance

Reg Harbeck

November 10, 2023

This transcript is edited for clarity. Reg Harbeck: Hi. I’m Reg Harbeck and today I am here with Milt Rosberg, who is the global VP at Vanguard Integrity Professionals, and we’re here to talk about patch management. Now Milt and I are both mainframers by background, so we have a particular experience with what the […]

Sponsored Content by
Vanguard Integrity Professionals

Articles

The Complete Beginners’ Guide to Hacking a Mainframe

Trevor Eddolls

October 12, 2023

Any movie or TV show makes hacking seem like a trivial affair. A couple of minutes of screen time and some nerdy kid shouts, “I’m in.” Five minutes later, all the data has been stolen and dangerous applications have been rewritten (compiled and executed). We know that’s not how it happens, but the worrying thing […]

Articles

The Cost of a Data Breach Reaches an All-Time High of $4.45 Million

Evelyn Hoover

September 26, 2023

MGM Resorts was the latest victim of a social engineering hack that brought the casino chain to its knees. The breach happened last week when hackers obtained a password by posing as an employee of the Las Vegas resort chain. According to published reports on TechCrunch and Bloomberg, the attack crippled MGM’s hotel guest services […]

Articles

An Early Warning System for Ransom Attacks and Mainframe Breaches

Trevor Eddolls

September 15, 2023

Most mainframe sites can’t afford to be down for more than a few minutes—let alone the hours or days required to respond to a cyberattack with conventional processes. What is needed is an early warning system to detect and neutralize the most common forms of malicious attacks. The Benefits and Risks of Encryption Encryption can […]

Articles

Mainframe Security in the Age of AI

Trevor Eddolls

August 17, 2023

In theory, mainframe security should be easy—mainframes use RACF or similar products to control who can do what. However, security has never really been that easy, and today it definitely isn’t easy at all. The Challenges of Modern Mainframe Security First, mainframes aren’t little islands of computer processing anymore. They are intimately connected to the […]

Articles

The Glass Is More Than Half Full: From Attack to Defense

Mark Wilson

August 8, 2023

Vertali’s Mark Wilson discusses why it’s time to change the mindset around mainframes and cyber threats—making the platform part of every cybersecurity conversation in the organization

Articles

Detect and Eliminate Malware in Your Mainframe Systems

Al Saurette

July 27, 2023

Seldom a day goes by when we don’t hear about the latest ransomware attack. This is the current scourge of the internet, and mainframes are not exempt. Spreading malware—or if you are an insider, even “renting” malware as a service—is as easy as a trip to the web. Attack vectors that include cryptomining executables, encrypting […]

Key Enterprises LLC is committed to ensuring digital accessibility for techchannel.com for people with disabilities. We are continually improving the user experience for everyone, and applying the relevant accessibility standards.