Endpoint Detection and Response (EDR) solutions have become a necessary component of each...
Mainframe Blog
3 Steps to Shore Up Your Mainframe Security with Endpoint...
For decades, mainframes were practically locked away like vaults, and it was easy to take their...
The Mainframe Security Intelligence Gap
If you have a mainframe, it is nearly guaranteed that you are a professional organization who...
Changing Consumer Conceptions of PII Data Necessitate Event...
Europe’s Data Protection Directive emerged in 1995, just two years after the formation of the...
Top 10 Privilege Escalation Hacks For The Mainframe
“These files are secure, you would need special and operations privileges to access them!” I’ve...
Audit Compliance Will Not Stop a Mainframe Hacker
If your company uses big iron to power your IT infrastructure, then you have sensitive data which...
3 Tips to Consider When Moving from R4HA MLC to Tailored Fit...
Steve Solomon, Cost Optimization Product Manager and I recently recorded a podcast about the value...
Key Mainframe Takeaways from the Gartner Security & Risk...
Last week I attended the Gartner Risk and Security Management Summit in National Harbor, Maryland...