IT security professionals are focused on rooting out potential attack vectors that hackers can exploit to gain access to corporate data. That’s why the bring-your-own-device (BYOD) trend–the introduction of many new unsecured personal devices onto the corporate network just increases the number of
When you think about mainframe security, you probably think about RACF, ACF2, or Top Secret. But those security tools are just the tip of the iceberg when it comes to the potential security methodologies you could be using.
Over decades, the mainframe has earned a reputation as an impenetrable cybersecurity fortress. But, of course, the mainframe isn’t Fort Knox, and as the mission-critical resource for many corporations and government agencies, it’s a prime target for internal threats and external players.
Explore hot topics in enterprise IT from IBM Systems Magazine editors. Check out hand-picked articles on such topics as virtualization, IBM's new security analytics approach and more.
IBM Machine Learning for z/OS Announced
Explore hot topics in enterprise IT with hand-picked content from IBM Systems Magazine editors. Check out hand-picked articles on such topics as improving password security, mainframe collaboration and more.