Security Information & Event Management Blog | SIEM

DB2 is the Fort Knox of Mainframe Data, but is it as Secure?

If I were to say “Fort Knox,” you would picture something like Scrooge McDuck's vault overflowing with gold, yet the term “mainframe” is unlikely to get a similar reaction. In fact, many believe.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 7 of 7: Monitoring the Security of Your z/OS System

Every day, after you get your first cup of coffee, do you scan the mainframe security system violation and logging reports looking for abnormal behavior, strange activity, etc.?  Given the size of.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 6 of 7: Is the network connected to your mainframe secure?

This segment of my series was authored by Peter Hager and Earl Rasmussen of Net’Q (www.net-q.com). I thank them for their input since the network connected to our mainframes must also be secured.

.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 5 of 7: Monitoring Access to Sensitive Data

Now that you have eliminated all the z/OS system integrity vulnerabilities you could find, re-evaluated your user validation to minimize the possibility of credentials being stolen, found all your.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 3 of 7: Where's the data?

Mainframe Security: Part 3 - Where is all your sensitive data?

One vulnerability I see a lot are copies of sensitive data outside of the production environment. This sensitive data, if disclosed, can.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 2 of 7: User Authentication

Mainframe Security Part 2: User Authentication

How can a system accurately determine whether access to data should be allowed when it is not certain who the user is? We have seen this in the NSA -.

Read more

10 Step FIM Approach for Reliability, Data Security and Compliance

One area that you shouldn’t overlook that can derail your ability to hit IT service level agreements (SLAs) is file integrity monitoring (FIM). Your inability to uphold file integrity compromises.
Read more

Log Management Language Barrier Pt. 3: Where to Find Mainframe Events

Over the last few weeks I have written that mainframe people and enterprise security people use “Syslog” to mean two different things and that z/OS SYSLOG is not a good source for the kinds of.

Read more

Locking Down your Files Systems? – 10 File Integrity Rules to Live By

We hear every day of different viruses and attacks almost as if they were coming off an assembly line. They come in all shapes, sizes and forms, and they are becoming more sophisticated and.

Read more

Utilizing Self-aware, Neural Network Technology for Threat Detection

The key to enabling actionable intelligence in your SIEM strategy is to have recurrent neural network capability to help manage events. Take this example for instance: If I react to an event, is.

Read more
1 2
Page 1 of 2