Security Information & Event Management Blog | SIEM

The GDPR Aftermath: Lack of Real-Time Security Alerts from Your Mainframe Could Cost Your Organization Unforeseen Millions

The GDPR is in full effect and the first disclosure of a major breach subject to the regulation has happened. The Ticketmaster breach which affected British and international customers compromised.

Read more

Employees lack security and privacy training, and CISOs are worried, but is anyone doing anything about it?.

 The 2018 Ponemon Institute CISO survey of “What CISOs Worry About” debuted at the beginning of the year, and not surprisingly, cyber-risk and data breaches remain key concerns, with 67 percent of.

Read more

Four Keys to Ensure your Mainframe is Included in your Enterprise and Security Compliance Strategy

Mainframe computers process some of the world’s most sensitive data. 96 of the top 100 global banks, nine out of 10 of the top global life and health insurance companies, and 355 of global Fortune.

Read more

The Anatomy of a Mainframe Breach- z/OS Security Threats are Real

People have been talking about the demise of mainframes for years, yet they are storing, managing, and processing more information today than ever. Mainframes today process approximately 80.

Read more

Phil ‘Soldier of Fortran’ Young to Perform Live z/OS Pen Test in IBM Systems Magazine Webinar, Sponsored by CorreLog

Large companies face an increasing risk of data breaches from hackers around the world today more than ever, and governments are starting to clamp down on data security standards enforcement. Last.

Read more

DB2 is the Fort Knox of Mainframe Data, but is it as Secure?

If I were to say “Fort Knox,” you would picture something like Scrooge McDuck's vault overflowing with gold, yet the term “mainframe” is unlikely to get a similar reaction. In fact, many believe.

Read more

Guest Blog SHARE.org: Integrating Mainframe and Network Security Tools

When you think about mainframe security, you probably think about RACF, ACF2, or Top Secret. But those security tools are just the tip of the iceberg when it comes to the potential security.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 7 of 7: Monitoring the Security of Your z/OS System

Every day, after you get your first cup of coffee, do you scan the mainframe security system violation and logging reports looking for abnormal behavior, strange activity, etc.?  Given the size of.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 6 of 7: Is the network connected to your mainframe secure?

This segment of my series was authored by Peter Hager and Earl Rasmussen of Net’Q (www.net-q.com). I thank them for their input since the network connected to our mainframes must also be secured.

.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 5 of 7: Monitoring Access to Sensitive Data

Now that you have eliminated all the z/OS system integrity vulnerabilities you could find, re-evaluated your user validation to minimize the possibility of credentials being stolen, found all your.

Read more
1 2
Page 1 of 2