Security Information & Event Management Blog | SIEM

SC Magazine Five-Star Rating Comes at an Opportune Time for Organizations Seeking a Viable SIEM at a Reasonable Price

In May, CorreLog was pleased to announce a five-star rating from SC magazine on SIEM Correlation Server ver. 5.7.1 for its ease of use, performance, and value for money. Coincidentally, that same.

Read more

Making Sense of FISMA for Federal Agencies and Contractors

/ 0 Comments / in mainframe security, InfoSec, FISMA, NIST, FIPS / by Tony Perri

Thirty-five major government data breaches occurred between April 2015 and April 2016, according to SecurityScorecard’s 2016 U.S. Government Cybersecurity Report. While some appear to have.

Read more

4 Best Practices for IBM DB2 Access Auditing in the Era of Compliance Creep

80% of the world’s corporate data resides on mainframes, and IBM DB2 is a pack-leader for the performance and availability necessary to support immense mainframe workloads. This should be.

Read more

Phil ‘Soldier of Fortran’ Young to Perform Live z/OS Pen Test in IBM Systems Magazine Webinar, Sponsored by CorreLog

Large companies face an increasing risk of data breaches from hackers around the world today more than ever, and governments are starting to clamp down on data security standards enforcement. Last.

Read more

DB2 is the Fort Knox of Mainframe Data, but is it as Secure?

If I were to say “Fort Knox,” you would picture something like Scrooge McDuck's vault overflowing with gold, yet the term “mainframe” is unlikely to get a similar reaction. In fact, many believe.

Read more

Guest Blog SHARE.org: Integrating Mainframe and Network Security Tools

When you think about mainframe security, you probably think about RACF, ACF2, or Top Secret. But those security tools are just the tip of the iceberg when it comes to the potential security.

Read more

CorreLog Blog: Takeaways from SHARE Atlanta and Fuel for the CorreLog Product Roadmap

Another SHARE conference has come and gone, and we have much to report on where mainframe security is headed. Each year, SHARE demonstrates that the mainframe is not only here to stay, it’s.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 7 of 7: Monitoring the Security of Your z/OS System

Every day, after you get your first cup of coffee, do you scan the mainframe security system violation and logging reports looking for abnormal behavior, strange activity, etc.?  Given the size of.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 6 of 7: Is the network connected to your mainframe secure?

This segment of my series was authored by Peter Hager and Earl Rasmussen of Net’Q (www.net-q.com). I thank them for their input since the network connected to our mainframes must also be secured.

.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 5 of 7: Monitoring Access to Sensitive Data

Now that you have eliminated all the z/OS system integrity vulnerabilities you could find, re-evaluated your user validation to minimize the possibility of credentials being stolen, found all your.

Read more
1 2 3 4 5
Page 2 of 5