Implementing enterprise encryption can be a daunting and complex process. Organizations struggle with questions such as: What data should be encrypted? Where should encryption occur?
In a recent SHARE presentation, Eysha Powers, Software Engineer at IBM, discussed various encryption techniques avai
This year at SHARE Providence, SHARE members Simon Dodge, David Hayes, Stu Henderson and Buzz Woeckener presented The Four Corners of Enterprise Security, which focused on compliance and risk management, the importance of organizational values, how to stay on top of progress, and emerging cyber secu
Any effective data security system needs to be built as an integrated and intelligent security immune system, according to Julie Bergh, World Wide Lead Z Security Champion for IBM.
“The mainframe is the most securable platform out there, but today’s technologies – cloud, internet, mobile, big data,
It’s not easy to hack the mainframe. But, it is possible.
Naturally, it’s easier for company insiders, who already have privileged access to key mainframe information, to wreak havoc. In a recent SHARE presentation, Charles Mills, Director of Advanced Projects for SIEM solutions provider CorreLog,
When new regulations are implemented, like GDPR or the New York State cybersecurity requirements for financial services companies, it’s challenging to figure out where you stand and what you need to do to stay compliant. From an IT perspective, it’s important for companies to show regulators how you