• May 26, 2020

Security

Security

Introducing IBM Z MFA v2.1 and its z/VM support

Secure authentication to critical IT infrastructure is paramount. Multi factor authentication is a critical improvement over legacy userid and password technology. The introduction of the IBM Z Multi-Factor Authentication V2.1 product enables the IBM z/VM operating system to benefit from this security improvement.  With a larger remote workforce, it is paramount that all systems are […]

Security

Password Security: Single Factor, 2FA and Multi-Factor Authentication

On May 7, IT and technology businesses around the world celebrated World Password Day, a day meant to remind everyone of the importance of keeping personal and business data protected and secure. Unfortunately, surveys released on that day revealed that the changing dynamics of work—that is, the increase of remote workers—are putting password security in […]

Security

Adapting to the new normal: Remote work and the mainframe

Work from home has become an essential business proposition and it’s not just for today. It’s something that we’re going to live with for many years. As a result, we need to rethink how we’re connecting to the mainframe today. Accessing the mainframe First things first, a connection is necessary. Rocket BlueZone Web 3270 emulator. […]

Security

“Set it and forget it” should not be your approach to cybersecurity

As the world turns to remote working in light of the recent COVID-19 pandemic, cybersecurity is becoming a hot topic. Many businesses were forced to adapt quickly to remote work, without a security plan in place. Other businesses were already set up for remote work, but with an uncertain timeline, some aspects of cybersecurity may […]

Security

Rethinking the role of the IBM Z during the COVID-19 quarantine

The COVID-19 quarantine is changing a lot of our lives, including working from home 100% of the time. This makes it a great time to revisit how your business is using its IBM Z. There are some terrific capabilities that can dramatically improve your business’ responsiveness to problems. These include reacting to spikes in business […]

Security

Ban default passwords with system value settings in IBM i 7.2

When you create a new user profile, the historical tendency is to use the IBM-supplied default value for the User’s new password. The password value is shown on the command prompt as *USRPRF. (Figure 1) When the value *USRPRF is used to specify the password, the user’s password will be set to match the name […]

security Security

The power of terminal emulation in 2018: simplifying security, facilitating compliance

While organizations have been using terminal emulation on mainframes for 30+ years, the tech landscape has certainly changed around them. The good news is that terminal emulators have evolved dramatically as well. Suffice it to say that for many large organizations, mainframes continue to be a very secure and viable option for running mission-critical programs […]

security Security

George Clooney, healthcare, security & mainframes

The recent launch of IBM’s z14 demonstrates to me just how important mainframes really are in the world of corporate computing. After all, when CNBC, the Wall Street Journal and even Wired label a new computer a game-changer, you know this latest mainframe must be a game changer. While most of the attention has been […]

IBM z14 mainframe Security

The new IBM z14 mainframe: real security for the real world

Achieving perfect digital security is actually pretty easy. All you need to do is to keep your machine completely isolated from the Internet, or even from other computers. While you’re at it, you should also get rid of any removable storage devices. After all, you can’t break into a house with no doors and windows. […]

Multi-factor authentication Security

Multi-factor authentication: protecting your data in the cloud

IBM just announced that its new z13 and z13s systems are optimized for the hybrid cloud. This is a good thing, but every time someone utters the word “cloud,” the same issue gets raised: how can data be secure in the cloud? As a mainframe security professional, I think about this problem a lot. I […]