IBM Security Z Security

The Library is the place to find attachments from the group's discussions posts as well as file uploads and other resources that will help you learn and develop your skills. If you're looking for something specific that you can't seem to find, ask in the forums and your peers might just have something useful to share!

Search Library Entries

33 Entries
 
 
5 months ago

Authenticating to Db2 for z/OS with a single credential is no longer considered secure and compliant. Multi-Factor Authentication (MFA) requires more than a single credential for authentication. ...

Attachments
5 months ago

The availability and accessibility of cryptographic keys determines who can open an encrypted data set. Who should have access to the key labels? Who should have access to the key stores? ...

Attachments
5 months ago

In this session Mark Wilson discusses the dark web and how it has changed over the last 24 months.

We also recap TOR and the online markets and look at what effect the global pandemic ...

Attachments
5 months ago

In this session Philippe Richard describes how we set up and configured a zOS LDAP server (IBM Tivoli Directory Server) for zOS Container Extensions (zCX) and other open source applications ...

Attachments
5 months ago

The rapid increase in containerisation of workloads has brought us to a threshold of thinking about various security aspects around container deployment. In the recent year OpenShift ...

Attachments
5 months ago

The IBM Db2 Analytics Accelerator offers the ability to accelerate your business analytics. With the introduction of the "V7 Accelerator on IBM Z," IBM added an additional layer of ...

Attachments
5 months ago

This technical keynote address was delivered by Mike Jordan, IBM Distinguished Engineer for IBM Z Security.

Attachments
5 months ago

This session on IBM Fully Homomorphic Encryption is conducted by Rushir Patel, Eli M Dow, and Flavio Bergamaschi.

#ZSecurity

Attachments
5 months ago

This new client-driven feature of z/OS provides a powerful tool that dynamically scans authorized code for integrity.  It tests the Program Calls (PCs) and Supervisor Calls (SVCs) of ...

Attachments