Search

1 to 10 of 15
Sort by

Blog Entry
Plenty of Room in Z Security for "New-Collar" Developers…and for You Gamers, Plenty of Weapons

By Marilyn Thornton I’m going to be right up front with you, dear readers. This is a recruiting blog. It’s likely that if you are reading this in the IBM Security Community space, you already have a role in an IT security discipline, but there are young men and women out there who may not have...

Marilyn Thornton's profile image

Blog Entry
Four Seconds from Flight to Fight: How Mainframe-Security Tools and Training Can Save Your Bacon

Though I’ve known Mark Nelson for over two decades, I was really looking forward to this interview. Mark has one of those ageless faces; he could be 30 or 60, you wouldn’t know because he always looks 25. He’s a renaissance man, husband, father, choir director, writer of a RACF reference book,...

Marilyn Thornton's profile image


Library Entry
Configuring zCX with ldap on z/OS (ITDS) with RACF and MFA Support - Philippe Richard [Video + Slide Decks]

In this session Philippe Richard describes how we set up and configured a zOS LDAP server (IBM Tivoli Directory Server) for zOS Container Extensions (zCX) and other open source applications (DPP,…). #ZSecurity

3 attachments


Library Entry
Securing Workloads with OpenShift on Z/LinuxONE - Pradeep Parameshwaran [Video + Slide Deck]

The rapid increase in containerisation of workloads has brought us to a threshold of thinking about various security aspects around container deployment. In the recent year OpenShift has gained a lot of traction across the enterprises for its end to end container deployment model and the...

2 attachments


Library Entry
Secure Db2 acceleration with Db2 Analytics Accelerator on IBM Z - Chris Watson [Video + Slide Deck]

The IBM Db2 Analytics Accelerator offers the ability to accelerate your business analytics. With the introduction of the "V7 Accelerator on IBM Z," IBM added an additional layer of security by making use of the Secure Service Container (SSC), directly on the IBM Z platform. In addition to the...

2 attachments


Library Entry
IBM Fully Homomorphic Encryption - Rushir Patel [Video + Slide Deck]

This session on IBM Fully Homomorphic Encryption is conducted by Rushir Patel, Eli M Dow, and Flavio Bergamaschi. #ZSecurity

2 attachments


Library Entry
The IBM z/OS Authorized Code Scanner (zACS) - Brian Childs [Video + Slide Deck]

This new client-driven feature of z/OS provides a powerful tool that dynamically scans authorized code for integrity. It tests the Program Calls (PCs) and Supervisor Calls (SVCs) of the z/OS stack, which can include code from IBM, from the z/OS ecosystem, or in-house client code. Intended as a...

2 attachments


Library Entry
Z Security Conference Keynote - José Castano [Video + Slide Deck]

In this keynote session from the 2020 Z Security Conference, VP José Castano discusses the current strategy for Z and LinuxONE, introduces the IBM Z Cyber Vault solution, and highlights other topics important to Z users. #ZSecurity

2 attachments