Search

1 to 10 of 18
Sort by

Blog Entry
More communities for z Security!

Security is such a hot topic on the mainframe that IBM hosts two different communities. One from a Mainframe perspective, which is here and the other from a Security perspective, which is here: IBM Security-Z Security. In the IBM Security community, you'll find information about z Multi...


Blog Entry
The Z-Security Ransomware Imperative: A Recipe for Effective Starters, Quick Trialing and Rapid Implementation

By Marilyn P. Thornton Here’s the headline: “White House Pushes for Companies to Take Ransomware More Seriously after High-Profile Cyberattacks.” That was three weeks ago, and the hits just keep coming. There has practically been a new White House statement and new headlines about ransomware...

Marilyn Thornton's profile image

Blog Entry
Can Sailboats Sail Boats?

Bah! Mainframes will be Safer When Sailboats Sail Boats! Automation, Integration, Offense, Defense…Z System Security is More Advanced than Ever, Captain By Marilyn P. Thornton Remember that commercial featuring “the world’s most interesting man?” That wasn’t him. I know the world’s...

Marilyn Thornton's profile image


Blog Entry
Plenty of Room in Z Security for "New-Collar" Developers…and for You Gamers, Plenty of Weapons

By Marilyn Thornton I’m going to be right up front with you, dear readers. This is a recruiting blog. It’s likely that if you are reading this in the IBM Security Community space, you already have a role in an IT security discipline, but there are young men and women out there who may not have...

Marilyn Thornton's profile image

Blog Entry
Four Seconds from Flight to Fight: How Mainframe-Security Tools and Training Can Save Your Bacon

Though I’ve known Mark Nelson for over two decades, I was really looking forward to this interview. Mark has one of those ageless faces; he could be 30 or 60, you wouldn’t know because he always looks 25. He’s a renaissance man, husband, father, choir director, writer of a RACF reference book,...

Marilyn Thornton's profile image


Library Entry
Configuring zCX with ldap on z/OS (ITDS) with RACF and MFA Support - Philippe Richard [Video + Slide Decks]

In this session Philippe Richard describes how we set up and configured a zOS LDAP server (IBM Tivoli Directory Server) for zOS Container Extensions (zCX) and other open source applications (DPP,…). #ZSecurity

3 attachments


Library Entry
Securing Workloads with OpenShift on Z/LinuxONE - Pradeep Parameshwaran [Video + Slide Deck]

The rapid increase in containerisation of workloads has brought us to a threshold of thinking about various security aspects around container deployment. In the recent year OpenShift has gained a lot of traction across the enterprises for its end to end container deployment model and the...

2 attachments


Library Entry
Secure Db2 acceleration with Db2 Analytics Accelerator on IBM Z - Chris Watson [Video + Slide Deck]

The IBM Db2 Analytics Accelerator offers the ability to accelerate your business analytics. With the introduction of the "V7 Accelerator on IBM Z," IBM added an additional layer of security by making use of the Secure Service Container (SSC), directly on the IBM Z platform. In addition to the...

2 attachments