This article examines three steps for a simple, yet practical implementation of securely exposing your existing IMS transactions as RESTful APIs.
April 03, 2019
|
By Subhasish Sarkar
Imagine being directed by your manager to identify the overall quality of the cryptographic protection for your z/OS network. What exposures do you have? Who is using unapproved protection protocols, or worse, not using any protection at all? Where would you start?
July 25, 2018
|
By Michael Gierlach, Chris Meyer and Dave Wierbowski
Pervasive encryption, available on IBM z14, offers complete data protection.
October 25, 2017
|
By Alan Radding
Knowing your system will ensure that the setup and configuration is secure.
June 21, 2017
|
By Reg Harbeck
Not all monoliths are mainframes. But they often have a lot in common beyond their size, solidity and endurance, such as information.
July 15, 2015
|
By Reg Harbeck
It’s worth the time and effort to develop security habits.
April 08, 2015
|
By Dinesh D. Dattani
With the amount of data being produced, we need to figure out how secure is secure enough.
July 09, 2014
|
By Reg Harbeck
The new mainframe security maturity model shouldn’t be that different from what a competent System z shop should have been doing all along. The difference will be an expanded scope to include mobile, cloud, social and all the new ways users interact with the mainframe; expanded automation; and more analytics.
November 13, 2013
|
By Alan Radding
Mainframe operations can certainly be affected by mobile security threats to a company's IT system. Enter service virtualization—an especially useful tool for developers that are building complicated mobile apps that integrate deep into an enterprise's IT system.
September 18, 2013
|
By Erika Morphy
When facing an audit, learn what’s being audited. Review documents auditors will use before they arrive. That will avoid surprises and prepare you better.
January 16, 2013
|
By Gabe Goldberg
Even though the mainframe is known for security, there's always a risk that an employee—maliciously or by mistake—will threaten an installation's interests. Therefore, comprehensive security requires detecting and defeating insider threats.
September 19, 2012
|
By Gabe Goldberg
As a first step, mainframe security administrators can put stringent controls and safeguards in place for mobile devices. They should then participate in discussions and dialogue to help build best practices.
August 22, 2012
|
By Erika Morphy
Whether Santa just brought you a zEnterprise System or your workload is happily humming along on a previous technology generation, the arrival of a new year is always a good time for mainframers to review and renew essential security resolutions.
January 10, 2012
|
By Gabe Goldberg