Security Information & Event Management Blog | SIEM

Is Your Mainframe Security FISMA Compliant? If You Lack Real-Time Monitoring Capabilities, the Answer Is No.

The Federal Information Security Management Act (FISMA) added the weight of Federal fines to cyber security compliance in government operations, and for good reason ­– when compared to the cyber.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 7 of 7: Monitoring the Security of Your z/OS System

Every day, after you get your first cup of coffee, do you scan the mainframe security system violation and logging reports looking for abnormal behavior, strange activity, etc.?  Given the size of.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 6 of 7: Is the network connected to your mainframe secure?

This segment of my series was authored by Peter Hager and Earl Rasmussen of Net’Q (www.net-q.com). I thank them for their input since the network connected to our mainframes must also be secured.

.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 5 of 7: Monitoring Access to Sensitive Data

Now that you have eliminated all the z/OS system integrity vulnerabilities you could find, re-evaluated your user validation to minimize the possibility of credentials being stolen, found all your.

Read more

InfoSec Firsts:  CorreLog and XBridge Combine to Unveil the Industry's First Data Loss Prevention (DLP) and Real-Time SIEM for z/OS at SHARE San Antonio

Information and innovation are the most valuable commodities in our increasingly digital world. Thanks to the IT revolution, we now enjoy virtually instant categorization and access to key enterprise.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 4 of 7: Who has access to your sensitive data?

Now that we’ve gone through verifying that your system has no known integrity vulnerabilities, users are validated in a manner that will minimize the chance of someone stealing their identity and.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 3 of 7: Where's the data?

Mainframe Security: Part 3 - Where is all your sensitive data?

One vulnerability I see a lot are copies of sensitive data outside of the production environment. This sensitive data, if disclosed, can.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 1 of 7: System Integrity

Mainframe Security Part 1: System Integrity

I’m often asked about what installations can do to maximize their data security in an IBM mainframe environment. For those that do not know me, I was.

Read more

DAM that HACK! 7 ways your z/OS DB2 can alert you to cyber threat

Database Activity Monitoring (DAM) is defined by Gartner as “… tools that can be used to support the ability to identify and report on fraudulent, illegal or other undesirable behavior, with.

Read more

Event Data vs. Syslog Data: 4 points of distinction for the CISO

It should come as no surprise that security information and event management, or SIEM, has been fueled by industry standards groups and government agencies. Leading the charge to how data and.

Read more
1 2
Page 1 of 2