1 to 10 of 26
Sort by

Blog Entry
The Z-Security Ransomware Imperative: A Recipe for Effective Starters, Quick Trialing and Rapid Implementation

By Marilyn P. Thornton Here’s the headline: “White House Pushes for Companies to Take Ransomware More Seriously after High-Profile Cyberattacks.” That was three weeks ago, and the hits just keep coming. There has practically been a new White House statement and new headlines about ransomware...

Marilyn Thornton's profile image

Blog Entry
Plenty of Room in Z Security for "New-Collar" Developers…and for You Gamers, Plenty of Weapons

By Marilyn Thornton I’m going to be right up front with you, dear readers. This is a recruiting blog. It’s likely that if you are reading this in the IBM Security Community space, you already have a role in an IT security discipline, but there are young men and women out there who may not have...

Marilyn Thornton's profile image

Library Entry
When “Tip of the Iceberg” is Not a Cliché: Why holistic enterprise data security requires Guardium z/OS

It looked simple enough. The SOC team picked up a breach event triggered in the SIEM stream and all clues pointed to Bill the DB2 Admin. Bill loves cars. He’s a gear head and he would look at cars online all day if he could. Sure, he gets his work done—he’s a pretty good admin—but this time...


Blog Entry
IBM Z Security Master “SkillZ” Bootcamp

Do you have plans for mid September? If so, you might want to cancel. On September 10-12th the IBM Z Security team is offering a complementary, three-day Master Skills Class in Austin, TX where you and your colleagues can learn from the most knowledgeable people in our industry. ...

Mike Rich's profile image