Back in 2017, The Economist declared that the world’s most valuable resource is data. And a cursory...
Security & Compliance Blog
Top IT Security, InfoSec & CyberSecurity Conferences
Conferences are an important part of any industry, especially in the crucial, quickly evolving...
What Is the CIA Security Triad? Confidentiality, Integrity...
It’s easy to protect some data that is valuable to you only. You could store your pictures or ideas...
Introduction To Data Security
Data Security refers to the set of practices and standards we use to protect digital information...
Better together: Application Audit and AMI Security
One of BMC Software’s most exciting announcements this year was the acquisition of Compuware,[1]...
Myth Debunked: My Mainframe Can’t Be Hacked
The Modern Mainframe · Myth Debunked – My Mainframe Cant Be Hacked In this episode of BMC AMI...
Post-Mortem of a Mainframe Hack
The Modern Mainframe · Post Mortem Of A Mainframe Hack In this episode of BMC AMI Z Talk, Grant...
Time to Train? Getting the Right People and Skills to Optimize...
Does a post-coronavirus world mean new opportunities to access and benefit from mainframe skills...