Implementing enterprise encryption can be a daunting and complex process. Organizations struggle with questions such as: What data should be encrypted? Where should encryption occur?
In a recent SHARE presentation, Eysha Powers, Software Engineer at IBM, discussed various encryption techniques avai
This year at SHARE Providence, SHARE members Simon Dodge, David Hayes, Stu Henderson and Buzz Woeckener presented The Four Corners of Enterprise Security, which focused on compliance and risk management, the importance of organizational values, how to stay on top of progress, and emerging cyber secu
IBM promotes Db2 for z/OS as a solution for business intelligence and data analytics. Its latest version, Db2 12, improves scalability, data ingestion capabilities, and performance, according to IBM’s Robert Catterall in a recent SHARE presentation.
Central to Db2’s ability to offer powerful and c
Any effective data security system needs to be built as an integrated and intelligent security immune system, according to Julie Bergh, World Wide Lead Z Security Champion for IBM.
“The mainframe is the most securable platform out there, but today’s technologies – cloud, internet, mobile, big data,
It’s not easy to hack the mainframe. But, it is possible.
Naturally, it’s easier for company insiders, who already have privileged access to key mainframe information, to wreak havoc. In a recent SHARE presentation, Charles Mills, Director of Advanced Projects for SIEM solutions provider CorreLog,