IBM Security for Z

 View Only

zSecurity.jpg

Welcome to IBM Z Security
Join this online user group to communicate across Z Security product users and IBM experts by sharing advice and best practices with peers and staying up to date regarding product enhancements.


As a member of this online user community, you gain:

  • Direct engagement with IBM subject matter experts
  • Tips and tricks from your industry peers
  • News, announcements, and enhancement details

You’ll also get information regarding our regional and virtual user group meetings, upcoming webinars, how-to blogs, and training. We invite you to participate and ask that you contact support@communitysite.ibm.com with any questions.

IBM Z Security Resources

Latest Discussions

  • Thank you to everyone who replied. You've given me a lot to think about and digest. Very much appreciated! Brent Brimacomb Wells Fargo ------------------------------ Brent Brimacomb ------------------------------

  • Hi Nathan, Yes, there is a way to do this, although it is probably less convenient than you'ld like. ACF2 writes two SMF records for updates to rule sets, one with ACF2_EVENTTYPE=UPDATE that contains the rule set's record image as it was before ...

  • Hi Nathan, you have got to be aware that zSecure using the CARLa programming language you can only report on information that is part of its input resources. An SMF record does not store the original version of a rule and only contains information about ...

Latest Blogs

  • Cryptography use is growing and becoming more widespread within organizations. Although many companies have adopted encryption in flight and at rest for privacy reasons, topics such as cyber security and quantum computing have caused many organizations ...

    1 person likes this.
  • Written by Sandeep Batta and Wen Ting Li In an increasingly digital world, safeguarding crown-jewel data—your most valuable and sensitive information—is more critical than ever. With advancements in technology and evolving threats, it's essential ...

  • One of the most disturbing types of cyber-attacks are those involving privilege escalation. The most common form is when a threat actor gains elevated access or administrative rights to a system by exploiting security vulnerabilities. Even the most secure ...

    2 people like this.
  • The Digital Operational Resilience Act (DORA) is a European Union (EU) regulation which refers to Information and Communication Technology (ICT) risk and sets rules on ICT risk-management, incident reporting, operational resilience testing and ICT ...

    2 people like this.
  • On April 5, 2024 a new service stream enhancement (SSE) to zSecure 3.1 has become generally available, providing compliance enhancements including a number of compliance controls for Center for Internet Security IBM Db2 13 for z/OS Benchmark v1.0.0, ...

    3 people like this.