When new regulations are implemented, like GDPR or the New York State cybersecurity requirements for financial services companies, it’s challenging to figure out where you stand and what you need to do to stay compliant. From an IT perspective, it’s important for companies to show regulators how you
The mainframe has been around for more than 50 years, but it’s time is now.
That was the message shared by IBM Chairman, President and CEO Ginni Rometty with conference attendees at this month’s SHARE Providence event.
Businesses today are increasingly aware of information security risks, and it’s easy to see why. It seems that every week there’s another news story of a high-profile security breach and no business wants to be next on that list.
The risks of a security breach are clear: the exposure of personal in
IT security professionals are focused on rooting out potential attack vectors that hackers can exploit to gain access to corporate data. That’s why the bring-your-own-device (BYOD) trend–the introduction of many new unsecured personal devices onto the corporate network just increases the number of
When you think about mainframe security, you probably think about RACF, ACF2, or Top Secret. But those security tools are just the tip of the iceberg when it comes to the potential security methodologies you could be using.