Search

1 to 10 of 25
Sort by

Blog Entry
The Z-Security Ransomware Imperative: A Recipe for Effective Starters, Quick Trialing and Rapid Implementation

By Marilyn P. Thornton Here’s the headline: “White House Pushes for Companies to Take Ransomware More Seriously after High-Profile Cyberattacks.” That was three weeks ago, and the hits just keep coming. There has practically been a new White House statement and new headlines about ransomware...

Marilyn Thornton's profile image


Blog Entry
Plenty of Room in Z Security for "New-Collar" Developers…and for You Gamers, Plenty of Weapons

By Marilyn Thornton I’m going to be right up front with you, dear readers. This is a recruiting blog. It’s likely that if you are reading this in the IBM Security Community space, you already have a role in an IT security discipline, but there are young men and women out there who may not have...

Marilyn Thornton's profile image





Blog Entry
IBM Z Security Master “SkillZ” Bootcamp

Do you have plans for mid September? If so, you might want to cancel. On September 10-12th the IBM Z Security team is offering a complementary, three-day Master Skills Class in Austin, TX where you and your colleagues can learn from the most knowledgeable people in our industry. ...

Mike Rich's profile image


Blog Entry
Z! Escape Room

While at the most recent SHARE conference, I was fortunate enough to try my luck at the Secure Z! Escape Room Experience. I was excited by the opportunity, as my daughters are escape room fanatics and have dragged me, uh I mean, encouraged me to join them in trying to solve the puzzles....

Howard Hirsch's profile image