It’s not easy to hack the mainframe. But, it is possible.
Naturally, it’s easier for company insiders, who already have privileged access to key mainframe information, to wreak havoc. In a recent SHARE presentation, Charles Mills, Director of Advanced Projects for SIEM solutions provider CorreLog,
Are you prepared to “rehearse the future?” I like this phrase, shared by one of our presenters at SHARE® Providence, because it tends to encapsulate the seemingly unattainable task that security administrators are up against on a daily basis: Prepare for anything!
Recent data breaches at major corporations have CEOs across the board on heightened alert. After all, it’s their reputations on the line. “Breaches are going to start costing CEOs their jobs – or their paychecks. Because of that, I’m hoping that now security will become more of a priority for them,”
IT security professionals are focused on rooting out potential attack vectors that hackers can exploit to gain access to corporate data. That’s why the bring-your-own-device (BYOD) trend–the introduction of many new unsecured personal devices onto the corporate network just increases the number of
When you think about mainframe security, you probably think about RACF, ACF2, or Top Secret. But those security tools are just the tip of the iceberg when it comes to the potential security methodologies you could be using.